0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000003000000800300000000000000000000380100003801000000000000b0020000b0020000b0020000b0020000b002000003000000", @ANYRES32=r0], 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000807fe4)={0xa, 0x4e22, 0x5, @loopback, 0x4}, 0x1c) pivot_root(&(0x7f00000062c0)='./file0\x00', &(0x7f0000006280)='./file0\x00') sendto$inet6(r2, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000100)=0x7) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) get_thread_area(0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000040)=0x1, &(0x7f0000000080)=0x4) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) sendto$inet6(r2, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000140)) recvmmsg(r2, &(0x7f0000006140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000004b00)=@rc, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004b80)=""/141, 0x8d}, {&(0x7f0000004c40)=""/59, 0x3b}, {&(0x7f0000004c80)=""/247, 0xf7}, {&(0x7f0000004d80)=""/90, 0x5a}, {&(0x7f0000004e00)=""/88, 0x58}], 0x5, &(0x7f0000004ec0)=""/7, 0x7}, 0x1e32cd08}, {{&(0x7f0000004f00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000006080)=[{&(0x7f0000004f80)=""/4096, 0x1000}, {&(0x7f0000005f80)=""/206, 0xce}], 0x2, &(0x7f00000060c0)=""/89, 0x59}, 0x8}], 0x3, 0x40010023, &(0x7f00000061c0)={0x0, 0x1c9c380}) 03:38:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000008000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1323.731856] kauditd_printk_skb: 117 callbacks suppressed [ 1323.731871] audit: type=1400 audit(2000000305.176:25054): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1323.899540] audit: type=1400 audit(2000000305.216:25055): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1324.049323] audit: type=1400 audit(2000000305.336:25056): avc: denied { map } for pid=29910 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0xfffffffffffffdef) [ 1324.186413] audit: type=1400 audit(2000000305.456:25057): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:25 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x2000, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000020807031dfffd946fa2830020200a0009000200001d85680c9a7ea20400ff7e", 0x24}], 0x1}, 0x0) [ 1324.335195] audit: type=1400 audit(2000000305.476:25058): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = accept(r0, &(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, &(0x7f00000002c0)=0x80) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)={0xc0002015}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000140)) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000001000000000000000000000027ff84d9a3eb1d586a35d085dd7e9bc0513d68af80fe4e671906368ab3814993f3c41dd78e5c3a8a35d849afe054c14b8516a29a153ed9e5b7e67a63085c758f"], 0x1}}, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:38:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x402, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7f, 0x9, 0x1, 0x0, 0x14}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x3}, 0x8) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffefffff, r0, 0x0, 0x4003) [ 1324.494899] audit: type=1400 audit(2000000305.546:25059): avc: denied { map } for pid=29915 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1324.632441] audit: type=1400 audit(2000000305.546:25060): avc: denied { map } for pid=29915 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1324.772294] audit: type=1400 audit(2000000305.556:25061): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:26 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000002c0)) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x4, 0x0, [], [{0x5, 0x0, 0xffffffffffff393c, 0x9, 0x9, 0x7}, {0x7, 0xfff, 0x100000000, 0x20, 0x4, 0xeae}], [[], [], [], []]}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x3, r1}) 03:38:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000018100000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1325.002368] audit: type=1400 audit(2000000305.556:25062): avc: denied { map } for pid=29910 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.182451] audit: type=1400 audit(2000000305.576:25063): avc: denied { map } for pid=29918 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1325.630220] netlink: 'syz-executor4': attribute type 2 has an invalid length. 03:38:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) getsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000002c0)=""/222, &(0x7f0000000000)=0xde) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:27 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x101) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x810c5701, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'ifb0\x00', {0x2, 0x4e21, @multicast2}}) 03:38:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='cmdline\x00') ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) ptrace$setopts(0x804206, r0, 0x3ff, 0x6) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:27 executing program 3: mq_unlink(&(0x7f0000000040)='\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7, @empty, 0xc5e1}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x1f, 0x20}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="e3", 0x1) 03:38:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000019020000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="04"], 0x1) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x008'], 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) fstatfs(r1, &(0x7f0000000100)=""/80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) 03:38:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x2, &(0x7f0000000140)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0], 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0x1ff, 0x0, 0x40}) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:28 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace(0x10, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x105201, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x8000000000000018, r0, 0x400, 0xfffffffffffffffc) fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x1000000000000000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r2, 0x0, 0x0) io_setup(0x10000000002, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000007d000)="b3", 0x1}]) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x11, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r8 = socket$l2tp(0x18, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000380)={0x27, 0x1, 0x1, 0x3, 0xf7aa, 0x1, "0de1a68a6dde6fd442a6a6566c4033904557c577aba9421e119997bdcbc56137500698b4b9948580dceb5a2035d4ce0a0f494083cd91e664e33fb1aca74893", 0xb}, 0x60) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r1, &(0x7f0000000240)=@random={'btrfs.', 'selinux\'user\x00'}, &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) r10 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000340)=r11) sendmmsg(r8, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'\x02\x00\x00\r(,\f\xe6\xd0j\xb1\x00\x02\x00', 0x580b}) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r0, &(0x7f00000000c0)) 03:38:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a0000003f000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:28 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x8000}, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setfsuid(0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x4, 0x4) r3 = open(&(0x7f0000000200)='./bus\x00', 0x1, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xab1) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000240)=""/116) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000001c0)={0x8001, 0x2}) lsetxattr$security_capability(&(0x7f00000006c0)='./bus\x00', &(0x7f0000000700)='security.capability\x00', &(0x7f0000000180)=@v3, 0x18, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) 03:38:29 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffaf02, 0xce0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 03:38:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc203e493290000fe8000000000aafefeffffffffffffffffff6183cb8fe0e7fe7f551a2939d323167476c9bdffa5a60f1d9a4067153c5684cd2004bbdb7d2090b70ace27f0455eac59bf8b233dac82be9260"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:29 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x81, 0x3, [0xe1, 0x4, 0x7]}, &(0x7f0000000140)=0xe) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x8, 0xbda1, 0xfffffffffffff801}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ioprio_get$pid(0x1, r0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000200)=0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_procfs(r0, &(0x7f0000000000)='oom_score_adj\x00') tkill(r0, 0x35) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000040000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000003c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0xa00000000000000) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f0000000180)=""/87, &(0x7f0000000240)=0x57) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00\x00\x00\x00\xf9\x8b\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x1000000000000000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r2, 0x0, 0x0) io_setup(0x10000000002, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000007d000)="b3", 0x1}]) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x11, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r8 = socket$l2tp(0x18, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000380)={0x27, 0x1, 0x1, 0x3, 0xf7aa, 0x1, "0de1a68a6dde6fd442a6a6566c4033904557c577aba9421e119997bdcbc56137500698b4b9948580dceb5a2035d4ce0a0f494083cd91e664e33fb1aca74893", 0xb}, 0x60) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r1, &(0x7f0000000240)=@random={'btrfs.', 'selinux\'user\x00'}, &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) r10 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000340)=r11) sendmmsg(r8, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'\x02\x00\x00\r(,\f\xe6\xd0j\xb1\x00\x02\x00', 0x580b}) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r0, &(0x7f00000000c0)) [ 1328.740749] kauditd_printk_skb: 135 callbacks suppressed [ 1328.740764] audit: type=1400 audit(2000000310.199:25199): avc: denied { map } for pid=29990 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1328.890243] audit: type=1400 audit(2000000310.199:25200): avc: denied { map } for pid=29990 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1329.026203] audit: type=1400 audit(2000000310.309:25201): avc: denied { map } for pid=29997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1329.140246] audit: type=1400 audit(2000000310.309:25202): avc: denied { map } for pid=29997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1329.281410] audit: type=1400 audit(2000000310.389:25203): avc: denied { map } for pid=29997 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1329.448050] audit: type=1400 audit(2000000310.389:25204): avc: denied { map } for pid=29997 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) exit_group(0xffc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) prctl$PR_MCE_KILL_GET(0x22) [ 1329.574884] audit: type=1400 audit(2000000310.459:25205): avc: denied { map } for pid=29997 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x1000000000000000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r2, 0x0, 0x0) io_setup(0x10000000002, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000007d000)="b3", 0x1}]) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x11, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r8 = socket$l2tp(0x18, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000380)={0x27, 0x1, 0x1, 0x3, 0xf7aa, 0x1, "0de1a68a6dde6fd442a6a6566c4033904557c577aba9421e119997bdcbc56137500698b4b9948580dceb5a2035d4ce0a0f494083cd91e664e33fb1aca74893", 0xb}, 0x60) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r1, &(0x7f0000000240)=@random={'btrfs.', 'selinux\'user\x00'}, &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) r10 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000340)=r11) sendmmsg(r8, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'\x02\x00\x00\r(,\f\xe6\xd0j\xb1\x00\x02\x00', 0x580b}) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r0, &(0x7f00000000c0)) [ 1329.709229] audit: type=1400 audit(2000000310.519:25206): avc: denied { map } for pid=29997 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:31 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0xffffffffffffffd3, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)={0x4a, 0x6f, 0x1, {0x5, [{0x2, 0x4, 0x8}, {0x0, 0x0, 0x6}, {0x10, 0x4, 0x6}, {0xa8, 0x3, 0x8}, {0x2, 0x3}]}}, 0x4a) 03:38:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x408000, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x4001, 0x0, 0xa, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setown(r2, 0x8, r0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x7) [ 1329.882845] audit: type=1400 audit(2000000310.519:25207): avc: denied { map } for pid=29997 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1329.991974] audit: type=1400 audit(2000000310.589:25208): avc: denied { map } for pid=29997 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:31 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x8b, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) semget(0x1, 0x0, 0x0) clock_gettime(0x4, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1ff, 0x7, 0x98, 0x8, 0x0, 0xfffffffffffffff7, 0x8, 0x8, 0x8001, 0x0, 0x401, 0x9, 0x6, 0x4, 0x6fd, 0x4, 0xb, 0x8, 0x7ff, 0x4, 0x3, 0x3, 0x1, 0x240000, 0x0, 0x68, 0xc36, 0x10000, 0x8, 0x7c, 0x6, 0xfffffffffffffff9, 0x10001, 0xfffffffffffffc01, 0x9, 0x1, 0x0, 0x3, 0x6, @perf_config_ext={0x931, 0x1}, 0x300, 0x7fff, 0x2, 0x0, 0x200, 0x7, 0x200}, r5, 0x1, r2, 0x8) r6 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x1, 0x182) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r6, 0x12, 0x2, &(0x7f0000000400)=""/194, &(0x7f00000003c0)=0xc2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000004, 0x10, r4, 0x0) r7 = semget(0x3, 0x4, 0xb0) semctl$GETVAL(r7, 0x3, 0xc, &(0x7f00000000c0)=""/218) recvmmsg(r3, &(0x7f0000001080), 0x0, 0x0, 0x0) 03:38:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000047030000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x20000000000007f, @rand_addr, 0x3}, 0xd86391b44f8a7fa6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x3a801, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:32 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x399f1736, r0}, &(0x7f0000000200)={0x1, 0x7, 0x9, 0xffffffff, 0x80, 0x6653}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x0) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x8001, 0x648, 0xfffffffffffff50e, 0xfffffffffffffff9, 0x8, 0x3}}, 0x8) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000140)=0x1f, &(0x7f0000000180)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x81, 0x4) ptrace$cont(0x27, r0, 0x20, 0x9) 03:38:32 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) inotify_init() r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x80) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0xa198) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:38:32 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 03:38:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000048000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24000000, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = gettid() write$cgroup_pid(r1, &(0x7f0000000000)=r3, 0x12) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x800) 03:38:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f00000001c0)="fbd0b50aeff7c5f670fe300b5f5db7a0646b1ad32e38cec6c80e5a6c50724702ef88f0f47d3b57c16744a7453c20a91202d8983ce4f54616460959fb23f5ab528f925576b18d681fa168e338cfbeef051d21f04876f44d0e312d562d8d2c8b3ce59585858515364887", 0x69, r0}, 0x68) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x1, 0xffffffffffffffff) 03:38:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000240)={r2, 0x10}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000600)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100)=0x9, 0x4) lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000780)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="00ff150007e80000a500082413c44f2484f116a185"], 0x1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)=0xfffffffffffffff8, 0x4) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x1) fchdir(r3) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0xa0}, {0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x7}, 0x7, 0x6e6bbb, 0x3, 0x0, 0x1, 0x3}, {{@in6=@mcast2, 0x4d4, 0x2b}, 0xa, @in6=@ipv4, 0x0, 0x0, 0x3, 0x24b, 0x0, 0x8}}, 0xe8) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aeea690e1b2ae74539f93951bd347b009f0a3c8a8e00601fedea17da1f9cbc6ed07bbce8417e3d1698cf0e8516d9bd32b8ca38d983301ade32af79fd2fe2d07000000f48af1b24b0b41db424d25728e9e9607ead4eec9518c62a62e50075cae8292b9c13407ba8efe3ce2d9be88fd1b98be210d8dd0de2eaea0afa2512c8a0a98bc5d9d"], 0xef) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) 03:38:34 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) listen(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @dev, @multicast1}, &(0x7f00000000c0)=0xc) getpeername$netrom(r0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000ac0)='memory.current\x00', 0x0, 0x0) getsockname$tipc(r3, &(0x7f0000004f80)=@id, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) r5 = accept(r4, 0x0, &(0x7f00000001c0)) recvmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000200)=@hci, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)=""/160, 0xa0}, {&(0x7f00000003c0)=""/194, 0xc2}, {&(0x7f00000004c0)=""/152, 0x98}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x4, &(0x7f0000000600)=""/159, 0x9f}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a0000004c000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:34 executing program 3: ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) inotify_init() r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0xa198) 03:38:34 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0x100000a, r0, 0x119a, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe6c00000000aafefe0448acc7ffe9a6530700000000000000ffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000140)={0x2, [0x3ff, 0x7]}, 0x8) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000240), &(0x7f0000000280)=0x4) recvfrom$ax25(r1, &(0x7f00000002c0)=""/253, 0xfd, 0x10000, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2}, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797a31af0c0ae70ca9844b0e2f17762a3a8ba330770775b88c6c91fe81000001009c8b2e275b6e3d0a84aafd3737a5239a72926d81a692de09750234a3f20edf8c"], 0x4) [ 1333.749125] kauditd_printk_skb: 108 callbacks suppressed [ 1333.749141] audit: type=1400 audit(2000000315.211:25317): avc: denied { map } for pid=30074 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1333.947796] audit: type=1400 audit(2000000315.221:25318): avc: denied { map } for pid=30076 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000020001, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 1334.104448] audit: type=1400 audit(2000000315.221:25319): avc: denied { map } for pid=30076 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1334.307540] audit: type=1400 audit(2000000315.311:25320): avc: denied { map } for pid=30074 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1334.447708] audit: type=1400 audit(2000000315.311:25321): avc: denied { map } for pid=30074 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000068000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1334.608764] audit: type=1400 audit(2000000315.341:25322): avc: denied { map } for pid=30077 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 2: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) [ 1334.747377] audit: type=1400 audit(2000000315.361:25323): avc: denied { map } for pid=30076 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4205, r0, 0x0, 0x0) getpriority(0x1, r0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x210000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1334.887380] audit: type=1400 audit(2000000315.361:25324): avc: denied { map } for pid=30077 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000880)='vmnet0\x00') [ 1335.013207] audit: type=1400 audit(2000000315.401:25325): avc: denied { map } for pid=30077 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1335.227726] audit: type=1400 audit(2000000315.411:25326): avc: denied { map } for pid=30077 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x2) r2 = socket$inet6(0xa, 0x80b, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a31dd5f27c43775816c48b8d2abe7e630bee99570769627f0d933ea3f9e8486435aeaefd1708b61be0d9be703ff11003bc19165e7b4c446bd2b64ab31d833efed400b0e3312a331e11c86dd9d0e737ee364fd450d8458ca82d140761c13c0c5f85c2e81457bc5b3fa2bbdbc24cf27ac9db193c91283227b3d31f48b6927ba9ec6273ad9cab95becdef0a838176f31cb182f6903742616e5751ecbd3ec5b64abe5a4c19721f901fef22f3b0a00fce3a01b1712541bb0da50944ea02b550b7404a655306fd02fb6294f2bb0f6"], 0x4) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x20000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x401, @remote, 0x7fff}, @in={0x2, 0x4e22, @multicast1}], 0x2c) 03:38:36 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x10, r0, 0x0) 03:38:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a0000006c000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x440500) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x2, 0x1, 0xb188, 0xa, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f00000000c0), 0x4) [ 1335.995408] NFS: bad mount option value specified: vmnet0 [ 1336.214508] NFS: bad mount option value specified: vmnet0 03:38:38 executing program 3: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4831, 0xffffffffffffffff, 0x0) 03:38:38 executing program 4: unshare(0x40000000) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ftruncate(0xffffffffffffffff, 0x2008200) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) chmod(&(0x7f00000002c0)='./bus\x00', 0x20) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000340)={0x2000}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 03:38:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x400, 0x10002) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xffffffffffffff54) sendmsg$nl_route_sched(r1, &(0x7f0000000540)={&(0x7f0000000080), 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@gettfilter={0x54, 0x2e, 0x0, 0x70bd29, 0x25dfdbfe, {0x0, r2, {0x10, 0xfffb}, {0xfff3, 0xd}, {0x6, 0xfff1}}, [{0x8, 0xb, 0x7}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x37e}, {0x8, 0xb, 0x80000000}, {0x8, 0xb, 0xfffffffffffffffc}, {0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:38 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) clone(0x10bffe, &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) 03:38:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000074000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:38 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = eventfd(0x561e) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2000, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x8000, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f0000000180)={r2, r3, 0x100}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x81c0000000000000, 0x0) 03:38:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f01"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:38:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400060000000040ffffffff000000000000000014000200fe8000000000000000000000000000aa"], 0x1}}, 0x0) 03:38:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a0000007a000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1338.018310] IPVS: ftp: loaded support on port[0] = 21 03:38:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:39 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e1f}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @dev, 0x7}}, 0x0, 0xf6, 0x0, "43313a9ae5458569a2ca13ac66f45354308f7d575b55947f8765910457309d5822a7d17b17c244d0df3c722d4224f175a2b489372a39aa1cbd5f39ae7481af0d2a2865d94423682c6a7cfc14e3e86b72"}, 0xd8) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdcb55e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) 03:38:40 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x840, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1338.884563] kauditd_printk_skb: 153 callbacks suppressed [ 1338.884591] audit: type=1400 audit(2000000320.334:25480): avc: denied { map } for pid=30162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1339.056574] audit: type=1400 audit(2000000320.414:25481): avc: denied { map } for pid=30162 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x80000000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000002aff0)=[{&(0x7f0000000080)="5400000020007f00b72c13b2a4a2809302000000030343026c26236925000400070000000000000065c634f128f1c46b7b31afdc1338d54400ecffffff00005ae583de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1}, 0x0) [ 1339.215139] audit: type=1400 audit(2000000320.414:25482): avc: denied { map } for pid=30162 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:40 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x9, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x8) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000bc0)='jffs2\x00', 0x400, &(0x7f0000000c00)='\x00') mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bb"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) lstat(&(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000880)) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000002c0)) stat(&(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000180)='fuse\x00', 0x200000, &(0x7f0000000a40)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize'}}], [{@euid_lt={'euid<', r3}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'security.capability\x00'}}, {@fsname={'fsname', 0x3d, 'user_id'}}, {@fsmagic={'fsmagic', 0x3d, 0x401}}, {@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, 'rootmode'}}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) [ 1339.409253] audit: type=1400 audit(2000000320.474:25483): avc: denied { map } for pid=30162 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a0000007f010000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1339.559131] audit: type=1400 audit(2000000320.554:25484): avc: denied { map } for pid=30162 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffff0800"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1339.723275] audit: type=1400 audit(2000000320.654:25485): avc: denied { map_create } for pid=30165 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) wait4(r0, &(0x7f0000000000), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x8000, 0x4}]}, 0xc, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0xaba4, 0x800, 0x5, 0xfffffffffffffffe, 0x8, 0x40000000000000, 0x0, 0x1}, &(0x7f00000001c0)={0x3, 0x80000001, 0x10001, 0x101, 0x2, 0x9, 0x1, 0x4}, &(0x7f0000000200)={0xff, 0x9, 0x7, 0x400, 0x0, 0x9, 0x3ff, 0x6}, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={0x8}, 0x8}) [ 1339.934811] audit: type=1400 audit(2000000320.704:25486): avc: denied { map } for pid=30162 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:41 executing program 4: [ 1340.052025] audit: type=1400 audit(2000000320.704:25487): avc: denied { map } for pid=30162 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1340.234646] audit: type=1400 audit(2000000320.714:25488): avc: denied { map_read map_write } for pid=30165 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1340.443321] audit: type=1400 audit(2000000320.744:25489): avc: denied { prog_load } for pid=30165 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1340.505381] netlink: 'syz-executor3': attribute type 4 has an invalid length. [ 1340.540887] netlink: 16 bytes leftover after parsing attributes in process `syz-executor3'. 03:38:42 executing program 3: 03:38:42 executing program 2: 03:38:42 executing program 4: 03:38:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4, &(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRES16=r0, @ANYRESDEC=r0, @ANYBLOB="8cc2b9eb6803763399bcb2fa6b9f13cc7d434c472acd4645d24bc2e3093347cb20de456b3b6b143c"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000080)={0x1, [0x8]}) 03:38:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x7ffffffe, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000080040000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:43 executing program 3: 03:38:43 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @dev, @multicast1}, &(0x7f00000000c0)=0xc) getpeername$netrom(r0, 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000ac0)='memory.current\x00', 0x0, 0x0) getsockname$tipc(r4, &(0x7f0000004f80)=@id, &(0x7f0000004fc0)=0x10) socket$inet(0x2, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socketpair(0xf, 0x0, 0x41e2, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) r6 = accept(r5, &(0x7f0000000140)=@alg, &(0x7f00000001c0)=0x80) recvfrom$inet6(r6, &(0x7f0000000800)=""/90, 0x5a, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}], 0x2, 0x2003, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x64c2140, 0x0, 0x0) 03:38:43 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(r0, 0x11, 0x2, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYBLOB="903f62354f66a4a33849d9f2763260e7024749519220e4c2a4f3a478820fd0b299a8fed91ee2353bb515e19ae523a1909e88f68faf2ec55515ce215032b5080a0026c7edc1deb1"], 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000340)={0x0, 0x0, 0x7fffffff}) close(r1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000006c40)=ANY=[@ANYBLOB], 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xf, r3, 0x4, &(0x7f0000000080)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 03:38:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a000000ff030000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0x0, @name="e88dfb437aab538ff9c56636717772e3a57698dca0dfb3a079d71e554eb3fcdd"}, 0x8, 0x4, 0x6}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/4\x00') getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:44 executing program 3: 03:38:45 executing program 2: [ 1343.937153] kauditd_printk_skb: 106 callbacks suppressed [ 1343.937169] audit: type=1400 audit(2000000325.396:25596): avc: denied { map_create } for pid=30225 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7f01000000000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1344.111689] audit: type=1400 audit(2000000325.426:25598): avc: denied { prog_load } for pid=30225 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:45 executing program 3: 03:38:45 executing program 4: [ 1344.325649] audit: type=1400 audit(2000000325.416:25597): avc: denied { map_read map_write } for pid=30225 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1344.522407] audit: type=1400 audit(2000000325.426:25599): avc: denied { map } for pid=30222 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1344.682436] audit: type=1400 audit(2000000325.456:25600): avc: denied { map } for pid=30222 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x54, 0x0, 0x5, 0x33, 0x8}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0xffffffffffff0000, 0x10}, 0xc) [ 1344.872258] audit: type=1400 audit(2000000325.556:25601): avc: denied { map } for pid=30222 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:46 executing program 2: [ 1345.116752] audit: type=1400 audit(2000000325.596:25602): avc: denied { map } for pid=30222 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1345.302269] audit: type=1400 audit(2000000325.686:25603): avc: denied { map } for pid=30234 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1345.482214] audit: type=1400 audit(2000000325.706:25604): avc: denied { map } for pid=30234 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:47 executing program 3: [ 1345.665573] audit: type=1400 audit(2000000325.726:25605): avc: denied { map } for pid=30233 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x8001000000000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000000)=0x5, 0x4) wait4(r0, 0x0, 0x8, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:48 executing program 4: 03:38:48 executing program 2: 03:38:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) sendto$netrom(r0, &(0x7f00000001c0)="87c8dc336500bf6734c75bd7f30747d274e0d3901320b1ebe5a964711204f91e4a756b27b7153d02e7a64c52e75ed5e48c411b9091c9133bb1e0b999eff19945617421c7eaf76dcc0b66098e72179d1044", 0x51, 0x20000000, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:48 executing program 3: 03:38:48 executing program 4: 03:38:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x8004000000000000, 0x0, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:48 executing program 2: 03:38:49 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x391000, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x3, 0x1f, 0x200, 0x4, 0xc, 0xfffffffffffeffff, 0x81, 0x80, 0xa78f, 0x80, 0x9, 0x1000}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:38:49 executing program 3: 03:38:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x101ed) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:49 executing program 4: 03:38:49 executing program 2: 03:38:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x2, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1349.021995] kauditd_printk_skb: 119 callbacks suppressed [ 1349.022011] audit: type=1400 audit(2000000330.489:25725): avc: denied { map } for pid=30277 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:50 executing program 3: [ 1349.194283] audit: type=1400 audit(2000000330.499:25726): avc: denied { map } for pid=30277 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x3) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)={0x4, 0x40}) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:50 executing program 4: [ 1349.351436] audit: type=1400 audit(2000000330.579:25727): avc: denied { map } for pid=30277 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1349.490265] audit: type=1400 audit(2000000330.629:25728): avc: denied { map } for pid=30277 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1349.641084] audit: type=1400 audit(2000000331.079:25729): avc: denied { map_create } for pid=30289 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:51 executing program 2: [ 1349.779774] audit: type=1400 audit(2000000331.079:25730): avc: denied { map_read map_write } for pid=30289 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x3, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1349.972528] audit: type=1400 audit(2000000331.169:25731): avc: denied { prog_load } for pid=30289 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:51 executing program 4: [ 1350.147401] audit: type=1400 audit(2000000331.229:25732): avc: denied { map_create } for pid=30289 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1350.349515] audit: type=1400 audit(2000000331.239:25733): avc: denied { map_read map_write } for pid=30289 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1350.514397] audit: type=1400 audit(2000000331.499:25734): avc: denied { map } for pid=30295 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000001c0)={0x1, 0x0, {0x40000000000, 0x2, 0x2014, 0xf, 0xa, 0x6, 0x3}}) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001600)='/dev/ubi_ctrl\x00', 0x408200, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000001640)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:53 executing program 2: 03:38:53 executing program 4: 03:38:53 executing program 3: 03:38:53 executing program 2: 03:38:53 executing program 3: 03:38:53 executing program 4: 03:38:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x5, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20400, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x8001002, 0x40, 0x2}) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:54 executing program 2: 03:38:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x4, 0x1) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000140)=""/251) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040)={0x0, 0x80}, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:38:54 executing program 3: 03:38:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/66, &(0x7f0000000080)=0x42) 03:38:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:55 executing program 2: clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c2a37d794e005cc4c1b62ac13e0f1110c442019dccd3196f27") socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) write$binfmt_elf32(r1, 0x0, 0x0) 03:38:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x200) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000140)) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000180)={0x37, 0x10001, r0, 0x0, r2, 0x0, 0xcc30, 0x6e}) 03:38:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x20000) setsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f00000003c0)=0x7, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x200, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x0, 0x70bd2a, 0x100000000, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x13, 0xedd, @l2={'eth', 0x3a, 'nr0\x00'}}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1354.039969] kauditd_printk_skb: 113 callbacks suppressed [ 1354.039984] audit: type=1400 audit(2000000335.511:25848): avc: denied { map } for pid=30341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1354.208553] audit: type=1400 audit(2000000335.511:25849): avc: denied { map } for pid=30341 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:55 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 03:38:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1354.415280] audit: type=1400 audit(2000000335.541:25850): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1354.585968] audit: type=1400 audit(2000000335.561:25851): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1354.800893] audit: type=1400 audit(2000000335.681:25852): avc: denied { map } for pid=30341 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1354.968448] audit: type=1400 audit(2000000335.771:25853): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1355.157178] audit: type=1400 audit(2000000335.771:25854): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1355.330281] audit: type=1400 audit(2000000335.871:25855): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xa) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)="d03437f36668b88bbf99eb80b2f43c2f09e96c21504c807a4f2045eb03b24554291e7097c970a08bd44b11f1b08f1f4c33bdd4d10f9ab8211466e93329199e3640d9a00e20c4e9b14defc32e950a19c848d4c70baf47f852ef20dfee0c74d5d856bb2b7aaa5bc45ab248cd77c69c656ce6b63eca8a") r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000080)=ANY=[@ANYBLOB="01000100080000000000000200000000"]) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000180)="0a5c2d0240316285717070") unshare(0x8000400) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x88000, 0x0) fchmod(r1, 0x100) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r4 = msgget(0x1, 0x0) msgctl$IPC_RMID(r4, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x600000, 0x0) sendmsg$key(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020b01020500000027bd7000fedbdf25030007002b20000002004e21a60000020000000000000000"], 0x28}}, 0x800) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000526000/0x4000)=nil, &(0x7f000061b000/0x1000)=nil, &(0x7f0000e39000/0x3000)=nil, &(0x7f000047e000/0x4000)=nil, &(0x7f000002b000/0x2000)=nil, &(0x7f0000939000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000025e000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f000004c000/0x4000)=nil, &(0x7f0000000000)="8f005633e82180341593aff542a48a39ff5ff76a5c07f6a7826b4705c3", 0x1d, r2}, 0x68) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r7}) getsockopt$inet6_int(r3, 0x29, 0xd0, &(0x7f0000000140), &(0x7f0000000240)=0x4) write$binfmt_script(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x110) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000480)=[{r8, 0x4001}, {r8, 0x4000}, {r0, 0x2}, {r8, 0x2}, {r1, 0x8}, {r0, 0x1}], 0x2000000000000039, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000540)={0x7}, 0xfffffffffffffd02) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000580)={0x0, @broadcast, @loopback}, &(0x7f00000005c0)=0xc) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000600)={r9, 0x1, 0x3, 0x381, 0x81, 0x9, 0x100000000}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') [ 1355.501119] audit: type=1400 audit(2000000335.881:25856): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r2 = socket(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000040)) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000200)={0x2, {{0x2, 0x0, @multicast2}}}, 0x149) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x3dc) [ 1355.706859] audit: type=1400 audit(2000000336.011:25857): avc: denied { map } for pid=30341 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:38:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:38:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e20, @local}}, 0x0, 0x3, 0x0, "78d7686a6d9c5a4cb6f4ea3a918f92ac2a2baa96001aeecf0bf6d57e0456035125bd22711c94c9a261e4324aa17bb5779cfbc9645b84b0ff1bfb2557cb9d0de44312fe4a8bce092150aa2ccf299e33f5"}, 0xd8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:38:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x8, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xa, r0, 0x2, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:38:58 executing program 2: ioctl$BLKPG(0xffffffffffffffff, 0x932, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) sched_setparam(r0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x20, {0x2, 0x4e22, @empty}, 'ip6erspan0\x00'}) io_submit(0x0, 0x1, &(0x7f0000000500)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x21, r1, &(0x7f00000003c0)="a74ee9f1bde232580d17e0c4ce49efd47fb6ddbbadf69961fd45e4843e8da39bb39b7c073ae0b0ae308ff78514850add7238f02914b90b27bd50dfa572637569f135a1dc40599b0048de676f5c49237debdd4d636594aaa8d92a7337bd0ebf3c2d3f56a3f48cec92ea905a279733e599425d3cb31b51948177defa5a8cc3b1d57433c4ea243f9ec38f861a54eba7b56796de1ceaf0ef76c9eaab06aeb07a3064718a3773fb2806091f7b6b41fd0ace46ce136af10b3c15aba768a7fbec38226212d9d46e1ba4a355f148d1f13beecd07472093b8bfd788eeafba81ea3d9850fe851fd9815d596fb3", 0xe8, 0x100, 0x0, 0x3, r1}]) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f00000005c0)={0x0, 0x0, {0xcfea, 0x9, 0x6, 0x2}}) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000c00)='./file0\x00') keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41}, &(0x7f0000000180)=0x18) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'ip6_vti0\x00', 0x9}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000c40)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x40000000000001}) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000c80)={0x3, 0x9}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, 0x0, &(0x7f0000000d80)) fchdir(r2) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000500)={0xb, 0x77, 0x2, 0x1f}, 0xb) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="4e3d2c7d82d5747b1d783d7406c7db5cffffd0a9451b689709029fdc1e8408"], 0x0, 0x0, 0x0, &(0x7f0000000dc0)) ptrace$getenv(0x4201, r0, 0xb8, &(0x7f0000000580)) 03:38:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:38:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() write$FUSE_CREATE_OPEN(r0, &(0x7f0000000200)={0xa0, 0x0, 0x1, {{0x6, 0x2, 0x6, 0x0, 0x9, 0x0, {0x6, 0x5, 0x1, 0x3, 0x1000, 0x6d, 0x8, 0x8, 0x5, 0x7, 0x3c123542, r1, r2, 0xffffffffffffff00, 0x9}}, {0x0, 0x1}}}, 0xa0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") timer_create(0x0, 0x0, &(0x7f00000003c0)) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_SET_CPUID(r3, 0x4004551e, &(0x7f0000000000)=ANY=[]) ioctl$sock_inet_SIOCRTMSG(r3, 0xc00c5512, &(0x7f00000000c0)={0x0, {0x2, 0x0, @dev}, {}, {0x2, 0x0, @multicast1}}) timer_delete(0x0) 03:38:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff7fffffff, 0x8000) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 03:38:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x48, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:38:59 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace$setopts(0x4200, r0, 0x0, 0x100000) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x3f, r1, 0x0, 0x0) 03:38:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:38:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000001640)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4001, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000140)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:38:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x62) 03:39:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYRES16=r0], 0x0) getsockname(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000140)=0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000240)={0x1, 0x9, 0x5, 0xfffffffffffffff8}, 0x6) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x8, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x2000) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0], 0x1, 0x14000000, 0x10001, 0x80, 0x55f, 0x7, {0x8, 0x10001, 0x2, 0x97, 0x651, 0x7, 0x7, 0x81, 0xffc, 0x4, 0x3, 0x9a, 0x3, 0x8001, "d60f146b2b639cbb33393b68d8104c11b7d15cfebbae234a47dd93bc3298f767"}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) uname(&(0x7f0000000340)=""/32) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0xfffffffffffffe6d) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4c, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0xfffffffffffffffa, 0x4) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1359.082838] kauditd_printk_skb: 151 callbacks suppressed [ 1359.082853] audit: type=1400 audit(2000000340.544:26009): avc: denied { map } for pid=30427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1359.233977] audit: type=1400 audit(2000000340.604:26010): avc: denied { map } for pid=30427 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1359.384471] audit: type=1400 audit(2000000340.604:26011): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1359.590714] audit: type=1400 audit(2000000340.604:26012): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x204}}, 0x20000000002) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02030609100000000000004c9320b74e0200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f00000000100003000000000000020001000000000000000b020000000005000500000000000a00000000000000ff170000000000000000000000000017000000000000000082b3d6b2f04523fc9370a5058e57cccbc3"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0x5) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', '{\',%)\x00'}, &(0x7f0000000200)='\x00', 0x1, 0x1) [ 1359.784810] audit: type=1400 audit(2000000340.754:26013): avc: denied { map } for pid=30427 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) sendfile(r0, r2, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x688000, 0x0) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000040)=""/59) [ 1359.950933] audit: type=1400 audit(2000000340.804:26014): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x68, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1360.124618] audit: type=1400 audit(2000000340.844:26015): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1360.344871] audit: type=1400 audit(2000000340.924:26016): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000240)={0x3, 0x3}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000001c0)={0x4, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}]}) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10000, 0x1) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x31c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$cont(0x18, r2, 0x0, 0x200) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000700)={[], 0x0, 0x0, 0x4, 0x0, 0x7, r2}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000005c0)=0x4) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000600)={r4, 0x3}, 0x8) ptrace$setregs(0xd, r2, 0x2000000, &(0x7f0000000080)) openat$audio(0xffffffffffffff9c, &(0x7f0000000640)='/dev/audio\x00', 0x101, 0x0) ptrace$cont(0x1c, r2, 0x87, 0x1000000003) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000680)={{0xa, 0x4e22, 0x3, @mcast1, 0x401}, {0xa, 0x4e23, 0x1ff, @empty, 0x1}, 0x6, [0x8000, 0x6, 0x4, 0x1, 0x3f19, 0x80, 0x100000000000000, 0x3c4]}, 0x5c) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\b\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x198}, 0x1, 0x0, 0x0, 0x4}, 0x44014) [ 1360.564398] audit: type=1400 audit(2000000340.954:26017): avc: denied { map } for pid=30433 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1360.679459] audit: type=1400 audit(2000000340.954:26018): avc: denied { map } for pid=30427 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6c, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x14, 0x207, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}}, 0x14}}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) sendmsg$nfc_llcp(r1, &(0x7f00000007c0)={&(0x7f0000000040)={0x27, 0x0, 0x1, 0x7, 0x5, 0xad7, "013cc38c7cfd6cfe6822802a329db2766b1084dd62a23389443660d7b076002160d0e785e0fdc9e4471a725c36f6f05c5aa1b748cfced16bfc969a4dabe4b5", 0x17}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000100)="a1c9e2cef59efebd2a5129010ef9a369136a5c01e8dbabba34573197e35469c1f584b1fe314fba639fe8c52cb630ba95c4819b52196c5d6c4161519e36179939a6ae1c615d0527ab54df967642033c9d5e5454b98e30b4cda24f347c3eaa2d576640f07ae8c9aa66ea04b44d13dcfb2a5d1de6b1d14d27892fe0994cbfe7690e6bdcde8535d6f0c524a47ea57c3677bec1d8dcd0ddea25077d9c6fa81b701bbb2f118a9d7763af563b6854449bbd899ecddcac963a0bba826a2993cc93595239f92f4e176af912dd8ba9f7b37f35d854705d5cab665858c751b162c18d44626e49b6da27f60ca4ef0bd6d7c4120de3a78ad2636b5ab5", 0xf6}, {&(0x7f0000000280)="4a8bc4c7d9c35f3b153cd3c032d481f1e55749a4dd2309324df001f76d4cf9594d82ee8885cdabc721e859d1b6a20f4d20dc3de12caba9a8c43f8eb05f3e41105dab800135cff8096ec7b7bab0f065319d490c021ec91b2376138b803bd02181e6fb7bc64c05dc7a7d6d4a0c5b145e030e6e408fa9dc023bfae5bfb1d605815755dd22ce295601f2387ae6b0a2e7989a1ac98729b14c2cfcb2faf51e9682e4d412d7f95bfc2ab95cb0542b811b55fd64ebc9fb93a33cd73e7856c70843e4aefeff98", 0xc2}, {&(0x7f0000000380)="e12c93771545908946d99ad48464aa67f14dde85a29658c9dcdd8fe48802ed9ecb3683d0b66ea78cb4f32ae49a68477a37b3c9e5beb12a3b99ba3b7ccbef868bd6489072b514683d093db11db420a9625820738e71ff46c16f980d6de3c4470c00a33464eba277637ed1d7bcf0b678ccbc2e837797e97a328789942d1da5", 0x7e}, {&(0x7f0000000400)="1d06debb30ea0b00f68adf2b7cecfecc6945b5537deb2dbc65ebdac01e1536156be5064508297ff8fb72aae709746ab51946d77e5626b71548b634a65195f96bd286ecf8170e", 0x46}, {&(0x7f0000000200)}, {&(0x7f0000000480)="935288be1b838e8b93520e0f28f9ecb8ff9fc3eaf2da191357fa4642d7c46b881afc989a890eb169e35c35e9f74c986808a5c0faa3172ef33f91b2a9ceb3b34dab3940a93e497a29e793b71276ba3420444c13755c2abd0ad76d488f01820d890539655d8d0f5fa19458cd933290998db5d9623567c554833614d992d4228fc067ac", 0x82}, {&(0x7f0000000540)="243c09ef1f23bf746744ea4879fc9c514fc2a5dbf8599ffa41042062fa1f617001901051facf2ad082397d7dfada3b05e45d9f8ef61e2192606cf22fb305d0d1f0694a15e68b14c34115a4f355af5d077e818913b0bfafad4a422365fc384047b9d5073c7676795249f5986f8f42157c3b2f30500cc8c663689271887e41a21397c67ba9764dac4a02159e83c92280c88a4b454544437341c642f9ba1e69de0e69eea494", 0xa4}, {&(0x7f0000000600)="c3bdbfe64f66027415067bfb763e7094ec06bbd9f7b282c2369dfdeda4159634002490d51bd590429b76c360da897a4fad9083bc49f6983f720f24b2296ef02d64135907e502641eb93d648b23afaecaf81d59952059163a73df1c1c8b79f98890d3bbed06e58d", 0x67}, {&(0x7f0000000680)="3982997966fd5a48eba994b06b497bd7f159fea5d5372edfca070e01", 0x1c}], 0x9, &(0x7f0000000780)={0x30, 0x11d, 0x3, "a2c5f7328d05eba30fcac98fd85c0f2c5c79bb894e6044a57db253f0"}, 0x30, 0x40010}, 0x4040000) 03:39:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0xfffffffffffffffd) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x8a) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000100)={0x0, 0x0, 0x2080}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0x81) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000080)=""/50, 0x32) 03:39:03 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @loopback, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000300)={@dev, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000380)={@loopback, @loopback, 0x0}, &(0x7f00000003c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000440)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @dev, @remote}, &(0x7f00000004c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004b40)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000004c40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004c80)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @initdev, @empty}, &(0x7f0000004d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d40)={0x0, @empty, @local}, &(0x7f0000004d80)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000005040)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000005000)={&(0x7f0000004dc0)={0x21c, r2, 0x401, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x898}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x130, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r13}}}]}}]}, 0x21c}, 0x1, 0x0, 0x0, 0x84}, 0x40080) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3a99}, 0x1c) name_to_handle_at(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x67, 0x5, "4b128ae4311bc329e0e4eec527682987360c910e16f256b450fe4a2f9f61210efd9041c812f3883ec2dca9afb0558cd1e190abf8e7805ecdf3c60521a8d2450aa73e6c46a3264a2f1b2ddb51d385a572bd7376bcda1be45a68753dcd5ea39c"}, &(0x7f0000000140), 0x1000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:04 executing program 2: writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000100)="1f00000002031900000007000000068100023b0509000100010100ff3ffeee", 0x1f}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="1f0000000203193b130907000000068100023b050900020000004000020058", 0x1f}], 0x1) alarm(0x1992) 03:39:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x74, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000000240), 0x0, 0x12001, 0x0) 03:39:04 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1363.504871] cgroup: fork rejected by pids controller in /syz5 03:39:05 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000300)={'stack ', 'tls\x00'}, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40080, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000001c0)=""/167) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x43) connect$inet6(r1, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r2, 0x8, r3) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1'}, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 03:39:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x14000, 0x108) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:05 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000000c0)) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) getgid() [ 1364.149306] kauditd_printk_skb: 133 callbacks suppressed [ 1364.149322] audit: type=1400 audit(2000000345.616:26152): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7a, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180), 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x4000) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000040)=0x1) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x3, @local}], 0x10) [ 1364.330835] audit: type=1400 audit(2000000345.626:26153): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1364.435189] audit: type=1400 audit(2000000345.736:26154): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1364.622367] audit: type=1400 audit(2000000345.736:26155): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1364.750300] audit: type=1400 audit(2000000345.796:26156): avc: denied { map } for pid=30511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1364.915648] audit: type=1400 audit(2000000345.826:26157): avc: denied { map } for pid=30511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1365.068660] audit: type=1400 audit(2000000345.866:26158): avc: denied { map } for pid=30511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1365.256410] audit: type=1400 audit(2000000345.866:26159): avc: denied { map } for pid=30511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:06 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x183000, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000040)={0x2, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:06 executing program 2: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x8, 0x8000000, &(0x7f0000000040)={0x0, r0+30000000}, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) [ 1365.487972] audit: type=1400 audit(2000000345.886:26160): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1365.605270] audit: type=1400 audit(2000000345.886:26161): avc: denied { map } for pid=30504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x17f, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz1', "54204f274ec13ae5dd00f17b490c06c188b56ad7592cee042abf8dd4e456be2a57286194caaadf13c105d960ec539f1ff91bcb9ed41d9f91d6ff197e515ee9b8db70daba2e7d49412363"}, 0x0) 03:39:07 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/186, 0x4a9e280) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000380)=0x404022) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10000, 0x200000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000200)=0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800c2, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) 03:39:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x219, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:08 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PDEATHSIG(0x1, 0x36) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x7, 0x8000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xfffffffffffffffc, r0, 0x1000, &(0x7f00000002c0)="cc610f01008323d271d7d451c1f333f83a8846ffbbf6cf529f6b48bcba2910a6ca5cedf45f255b585953d4b36fc71c2fdd6866def5a27c43d2ba1fac6d37efffc3b64741c36feb5fd4778f06f5477c41346001e292f10443") waitid(0x2, r0, &(0x7f0000000000), 0x1, &(0x7f0000000140)) ptrace$cont(0x1f, r0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$tipc(r2, &(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e23, 0x2}}, 0x10) 03:39:08 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30000000ebff24000000000005fd"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x400000) write$FUSE_IOCTL(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x43, 0x0, 0x1, 0x80}}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 03:39:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) listen(r0, 0x1) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="da0ae59e85ba2143286de3"], 0x1, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)) msgsnd(r1, &(0x7f00000000c0)=ANY=[], 0x0, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/17}, 0x19, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000100)={@loopback, @remote}, &(0x7f0000000140)=0xc) 03:39:09 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x20000) ioctl$RTC_UIE_OFF(r1, 0x7004) 03:39:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x300, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper={0x40086303}], 0x0, 0x0, 0x0}) r2 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x1013, r1, 0x0) r4 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000005, 0x13, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0xd8, 0x0, &(0x7f00000002c0)=[@clear_death={0x400c630f, 0x4, 0x1}, @acquire={0x40046305, 0x4}, @acquire={0x40046305, 0x4}, @reply_sg={0x40486312, {{0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f00000000c0)=[@flat={0x77622a85, 0x100, r2, 0x4}, @ptr={0x70742a85, 0x0, &(0x7f0000000040), 0x1, 0x4, 0x1c}, @fd={0x66642a85, 0x0, r1}], &(0x7f0000000200)=[0x40, 0x40, 0x78]}, 0x5}}, @register_looper, @reply_sg={0x40486312, {{0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x18, 0x20, &(0x7f0000000240)=[@flat={0x77622a85, 0xa, r3, 0x3}], &(0x7f0000000280)=[0x30, 0x28, 0x38, 0x30]}, 0x1}}, @acquire_done={0x40106309, r4, 0x1}, @exit_looper, @enter_looper], 0x4e, 0x0, &(0x7f00000003c0)="8e7770447223edcb193c3bb7882a4249981faa90a1386d3b4cb2278de898d697ea0a38b77398e913434ed2a5921891c9cf06fb06506a00ad83622c9262a0796f75f9531d2bec37b6dad67996c4a2"}) 03:39:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa4a1d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffff0004ff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2600, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000080)={0x7, 0x79, 0x2}, 0x7) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @rand_addr, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x400000000000003) r1 = socket$inet(0x2, 0x0, 0x5) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @local}, {0x2, 0x4e20, @remote}, 0x2, 0x0, 0x0, 0x0, 0x39, &(0x7f0000000000)='veth1_to_team\x00', 0x4, 0x400, 0x4f0912bf}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000200)={0x5, 0x1, 0x0, 0x2, 0x7}) setsockopt$inet_tcp_int(r2, 0x6, 0x1d, &(0x7f00000002c0)=0x9, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r3 = socket$netlink(0x10, 0x3, 0x0) msgget$private(0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3fc0000000) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x2, 0x0, 0x6}}, 0xe) 03:39:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x16) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1369.192598] kauditd_printk_skb: 114 callbacks suppressed [ 1369.192612] audit: type=1400 audit(2000000350.669:26276): avc: denied { map } for pid=30592 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1369.390085] audit: type=1400 audit(2000000350.759:26277): avc: denied { map } for pid=30592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1369.552700] audit: type=1400 audit(2000000350.759:26278): avc: denied { map } for pid=30592 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1369.690939] audit: type=1400 audit(2000000350.799:26279): avc: denied { map } for pid=30592 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x347, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1369.920000] audit: type=1400 audit(2000000350.949:26281): avc: denied { map } for pid=30592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) [ 1370.119192] audit: type=1400 audit(2000000350.949:26282): avc: denied { map } for pid=30592 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1370.299629] audit: type=1400 audit(2000000350.939:26280): avc: denied { map_create } for pid=30593 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1370.439974] audit: type=1400 audit(2000000350.979:26283): avc: denied { map_read map_write } for pid=30593 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x82002) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x4500000}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x7}, &(0x7f0000000300)=0x8) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0x70, 0x9, 0x8, "547ebef8c27c215b9ed5b04c379c9a5a2796026fad2c65780b5a644876e15a8319d2551dd69daf891142df710089c7c486552be408ace1f63ef2d4316adb272803df4fe2b240ea1d5b4f0c9357ba27a6570efdab6b76e73c7934f9ef2475274198c59be352d306bcd23842e2f6127f22"}) 03:39:12 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x20}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 03:39:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1370.640387] audit: type=1400 audit(2000000351.029:26284): avc: denied { prog_load } for pid=30593 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1370.796644] audit: type=1400 audit(2000000351.079:26285): avc: denied { map } for pid=30592 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x480, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) ioctl$TCFLSH(r1, 0x540b, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x102) write$UHID_CREATE(r2, &(0x7f0000000240)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000140)=""/202, 0xca, 0x7, 0x3e3, 0x9, 0x1f, 0x4}, 0x120) 03:39:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:13 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x20}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 03:39:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x500, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0xfffffffffffffe3d) 03:39:14 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000140)=@caif, 0x80, &(0x7f0000000480)=[{&(0x7f00000001c0)="b6043e2dbd7d4fedbd49787ae813142754af286bca715ddd5f2a4a762416d321432fb893de3932b3adcbf938dcd09b0a43589fd7c0cbd9a8ef0b8a2e90e769f926ca7f5cf1d9009290fe26bdf54a9eb0f695543a54ce9db17ee501ba2b3baa0e04507eead768e9c3e86839944a67dfb57cb836e3f85450bcf33a9b8376765aae2c7e34029131332b662a5c65bf399dbf191fce43917332c3f16b0d9db5b6e0e5922654d15ec0624bd8383772695d09c86cfe694dc6d8e64ea6e0c2073ecf2526c17796a74b625f8cf7aa9d05961caa2e552ff723", 0xd4}, {&(0x7f0000000080)="a8a5657febec04723a1d6082353573ce57ea", 0x12}, {&(0x7f00000002c0)="b14781a5070807f25305cdde4ebd4e2211fa9931f569a732df5bb95f05d7765f99b5b5b5d43927119e9551a1afb17d70b5705a14e34b7f7b0a132d17066fd115d3120b32479f8812e6b3eda17b47e0a56059ddb885cab464120252cd060b3b6896f7c55e9ca30e511711856ec980feea1cc9c219e57dc1a6ba13099f9411d706fd3bb0", 0x83}, {&(0x7f0000000380)="06c62b9bd8d41768c03dfdc774766909d8c84ec118534bd92197725efbdc1380af8e32d60d2de1e30698c14398760569b43a2234928291b06314027ba736d83cd2ade0952c21d3ad1aa67a8aa40ecc2025b4a7257b62a5d8a5afe098bb920aff31701373bcc1937269d6520c3c5682aeab23fcea1b7ebf814d11982cc5825bb242825baab9a5bcbcad6083740021", 0x8e}, {&(0x7f0000000440)="8307157b3cfb8a928ccf39f39d5349e1", 0x10}], 0x5, &(0x7f0000000500)=[{0x98, 0x11d, 0x7ff, "510e6006bef247719738c5bd043c5fb1240ad2ab6c95937a77f417813062f118d30bc3d058dfe355c7cf5e2833a9936a325a8cb26023ffd88e0e4bcb7c63dbd0cbce67ff43b742fbe6fd31f116c90de98c1718f068c9df88fc1dd15df3a71d21e5005d4f85a010a19d0e99d2b7cf08e199932769075ed607b27fdb5821a792dca06732699e2c08"}, {0x20, 0x89, 0xffffffff7fffffff, "68936b8f4fad8aab865726aa16c95914"}, {0x18, 0x10f, 0xbe, "f7e26f9d415b1b26"}, {0x100, 0x1ff, 0x9, "d82810efcb567551f13c972fae0deacd1e02c7791258a9b083a042bef591def42f16be8d3c6d207819d65bed63211dbe91d05bf560b414eaf12c89507728c1e7421275da03c51b67e866152109ac2471335e9cabffdb65bf95e798d82a96e8be162bbe76bc89386ae46cd8d9a11e152e0666c169901e9c50c54a8d14ecb737995e7144c401a0b58bed6f602008aef534b2b0575745d5624888f49f4530f6d89bf45b0e2804a492302f0898edffcbcd81b601f7eb515882836df39be6f57013993f9ea94439f5c4b5e4f3b2eda0331e2af2bdc5a57ad90cce005f1b125f7a223f9a68ca0025ee3a8d1d5245ee9e707d"}], 0x1d0}, 0x4000) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000740)={[], 0xfffffffffffffff7, 0x4, 0x1, 0xb9e, 0x0, r0}) 03:39:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, 0x0, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:14 executing program 3: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, &(0x7f0000000100)) r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, [0x0, 0x3f, 0xae3, 0x0, 0x5, 0x2, 0x2, 0x8d6e, 0x55, 0x7ff, 0x0, 0x0, 0x1, 0xf233, 0xb6]}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={r1, 0x3f, 0x8, 0x7, 0x8, 0x5}, &(0x7f00000005c0)=0x14) r2 = socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r3 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x0, 0x420040) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r2, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8}, {0x7, 0x101}]}, 0x14, 0x1) r4 = getpid() r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10080001}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x34, r5, 0x300, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xb, 0x9, @udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x34}}, 0x44) r6 = getpgid(r4) sched_setscheduler(r6, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) close(r0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 03:39:14 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x20}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 03:39:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x600, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000140)=0x14) syz_emit_ethernet(0x3, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r0, @ANYBLOB="36a9206e3ef284b2729987e810fbaa2edfa0dbb3a81286216bf4c52d6813f2367cb0a9603f38791defbc0281c89affc33f756fc10975a95da7e14e7f697b72c47135e4198f035c089b426658c0665850179c7082ed96ea31140865d570a2093036e2cf506487534da1a0e757fd2913482dc5101ddcedfd10915fc6dc05a689cdc1eaa17e", @ANYRES64=r0], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty, 0xffffffffffff8000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x200, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:15 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x20}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 03:39:15 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000080)=0xe8) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000240)={0x3, @bcast, r2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = dup(0xffffffffffffff9c) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000000)={0x2}) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1374.270720] kauditd_printk_skb: 152 callbacks suppressed [ 1374.270734] audit: type=1400 audit(2000000355.751:26438): avc: denied { map } for pid=30670 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1e, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@alu={0x4, 0x8, 0x7, 0xb, 0x7, 0x1e, 0xffffffffffffffff}, @alu={0x7, 0x3, 0x1, 0xb, 0x0, 0x2, 0x10}, @generic={0x1, 0x38c0, 0x6, 0x1, 0x8}, @map={0x18, 0x7, 0x1, 0x0, r0}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc99b}, @ldst={0x0, 0x1, 0x3, 0x3, 0x6, 0x0, 0x10}, @jmp={0x5, 0x9, 0xf, 0xf, 0x9, 0x0, 0x1}, @map={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f0000000100)='GPL\x00', 0xfffffffffffffffd, 0x59, &(0x7f0000000140)=""/89, 0x40f00, 0x1, [], 0x0, 0xb}, 0x48) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000240)={0x0}) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x4, 0x200042) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000003c0)={0x0, @aes256, 0x0, "67ce47bfd01a7ad2"}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000280)={r2, 0x80000, r1}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000a06a6c33af82ee7b556036ef42985100000000000000000000000000c15280875be5413dcb40f2acd39ca0c11481a526e94ef3dab2ecea156547b8258aff67ee6ce47c8a6164b5e327b6c7e5a754bc37bb27174c3e61e3fb63c7bbb1a6f5b51002a3531556f071ea5610d1cefeab2294d0a798fd312dc95db4d8641d07bf013ae1a22cf5a9b132493479c94113c7b26df2c41e9e31831b3d48d5f36faff7c57903d07b177c6271e0920f2306db47338"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1374.428289] audit: type=1400 audit(2000000355.831:26439): avc: denied { map } for pid=30670 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1374.558890] audit: type=1400 audit(2000000355.831:26440): avc: denied { map } for pid=30670 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x700, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1374.751323] audit: type=1400 audit(2000000355.901:26441): avc: denied { map_create } for pid=30673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1374.889682] audit: type=1400 audit(2000000355.951:26443): avc: denied { prog_load } for pid=30673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1375.025081] audit: type=1400 audit(2000000355.961:26444): avc: denied { map } for pid=30670 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000000, 0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1375.170772] audit: type=1400 audit(2000000355.961:26445): avc: denied { map } for pid=30670 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:16 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000140)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setitimer(0x3, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1375.308331] audit: type=1400 audit(2000000355.901:26442): avc: denied { map_read map_write } for pid=30673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:16 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000080)=0x100000001) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000040)="240000001a0025db006bb404b500000781cc08000200ac141410915c64b0c6d45f6ce818", 0x24) [ 1375.487976] audit: type=1400 audit(2000000356.001:26446): avc: denied { map_create } for pid=30673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:17 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x20}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1375.646290] audit: type=1400 audit(2000000356.011:26447): avc: denied { map_read map_write } for pid=30673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1018, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f123c12a41d88b070") setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0x200, 0x4, 0xfff, 0x3}, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="070000000000000000a070000000b2cea7"]}) 03:39:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xa0000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r2, 0x7fff}) 03:39:18 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x200) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0xe, 0xd3f9, 0x600, 0xe3, 0x401, 0x7fffffff, 0x1}, 0xc) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1810, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, 0x0, 0x0) [ 1377.600502] Unknown ioctl 1074021320 03:39:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000007140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) r2 = socket$inet(0x2b, 0x2000000, 0x44) sendfile(r2, r1, 0x0, 0xb) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(0x0) fcntl$getflags(r1, 0x401) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 03:39:19 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x2000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='security&)!em0)em0vmnet1mime_typeselinux\xf5$\x00'}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'vxcan1\x00', r3}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpgid(r0) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1902, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, 0x0, 0x0) 03:39:20 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x4080, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x800100a, 0x8, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCCBRK(r0, 0x5428) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYRESDEC=r1], 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000180), 0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080), 0xffffff1a) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:20 executing program 5: clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x1000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3895007b, 0x101200) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000400)='cgroup\'posix_acl_access-\x84(%:}&bdev\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffcb3, &(0x7f0000000300)='/dev/snd/seq\x00', r1}, 0x30) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000140)=""/21) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) getsockname(r2, &(0x7f0000000580)=@nl, &(0x7f00000001c0)=0x80) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1ea7a) umount2(&(0x7f0000000280)='./file0\x00', 0x0) connect$rose(r2, 0xfffffffffffffffd, 0x0) syz_open_dev$vcsn(0x0, 0x802, 0x804) bind$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000200)={0x0, 0x6}, 0x2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) 03:39:20 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1379.287399] kauditd_printk_skb: 136 callbacks suppressed [ 1379.287415] audit: type=1400 audit(2000000360.764:26584): avc: denied { map_create } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1379.480801] audit: type=1400 audit(2000000360.844:26585): avc: denied { map_read map_write } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x3f00, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1379.644838] audit: type=1400 audit(2000000360.864:26586): avc: denied { prog_load } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, 0x0, 0x0) [ 1379.804810] audit: type=1400 audit(2000000360.914:26587): avc: denied { map_create } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1379.924755] audit: type=1400 audit(2000000360.914:26588): avc: denied { map_read map_write } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1380.054770] audit: type=1400 audit(2000000360.984:26589): avc: denied { prog_load } for pid=30758 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:21 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1380.188700] audit: type=1400 audit(2000000361.354:26590): avc: denied { map } for pid=30764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x400000) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000002c0)=""/143) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x410000, 0x0) socket$inet6(0xa, 0x80000, 0x0) r3 = accept4$x25(r2, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="452a57bb231ffed4456fb83c4443ef1a9de2c70874d138132307366dcc7b65b311743944412bc54ea834d05c596d91a831f4f856c3600d6b63ccff00b422c08c2bd588ae02d7e44257050d8eac25235eb7c30b665878eaa2acc1bf6ff1820ebf76ebbcc9d0647a734bc540fbd8786df3baf488505268757df28f4f2256772e4c41c2e6bbfc6f301c1f2aef6ff5caabe22e526b1d62285f49471ab68217dbcce51999cfef936232f622bda14074eff550cbc4d07d6883bb8b57ebd73630a43a1f90f7fa6edabe6799302a0c2f04c98a29bff5d5a638c2686b0207a3fa31a55d5c7ab4") setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000400)) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaf3b9c45d827100d73cc524df92aaaaaa421d9531760601cc0dc2652b18140000fe80000000"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x2ca) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x4800) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1ff00000000, 0x10}, &(0x7f00000001c0)=0xc) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000380)=0x7, &(0x7f00000003c0)=0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000240)=0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1380.342089] audit: type=1400 audit(2000000361.354:26591): avc: denied { map } for pid=30764 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:21 executing program 3: r0 = socket(0x1e, 0x4, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0x7ff, 0x0, 0x9, 0x200}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1380.524467] audit: type=1400 audit(2000000361.424:26592): avc: denied { map } for pid=30764 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1380.654346] audit: type=1400 audit(2000000361.434:26593): avc: denied { map } for pid=30769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:22 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:22 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) [ 1381.812387] FAULT_INJECTION: forcing a failure. [ 1381.812387] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.883819] CPU: 0 PID: 30799 Comm: syz-executor4 Not tainted 5.0.0-rc3+ #44 [ 1381.891052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.900409] Call Trace: [ 1381.903017] dump_stack+0x1db/0x2d0 [ 1381.906668] ? dump_stack_print_info.cold+0x20/0x20 [ 1381.911732] ? check_preemption_disabled+0x48/0x290 [ 1381.916769] should_fail.cold+0xa/0x15 [ 1381.920673] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1381.925783] ? security_compute_av+0x282/0xba0 [ 1381.930406] ? find_held_lock+0x35/0x120 [ 1381.934478] ? security_compute_av+0x282/0xba0 [ 1381.939079] ? find_held_lock+0x35/0x120 [ 1381.943182] ? avc_compute_av+0x2d1/0x800 [ 1381.947351] __should_failslab+0x121/0x190 [ 1381.951602] should_failslab+0x9/0x14 [ 1381.955430] kmem_cache_alloc+0x47/0x710 [ 1381.959520] ? trace_hardirqs_on+0xbd/0x310 [ 1381.963856] ? kasan_check_read+0x11/0x20 [ 1381.968024] ? avc_compute_av+0x2d1/0x800 [ 1381.972185] ? trace_hardirqs_off_caller+0x300/0x300 [ 1381.977387] ? do_raw_spin_trylock+0x270/0x270 [ 1381.981987] avc_alloc_node+0x2a/0x630 [ 1381.985909] avc_compute_av+0x2d9/0x800 [ 1381.989899] ? check_preemption_disabled+0x48/0x290 [ 1381.994945] ? avc_alloc_node+0x630/0x630 [ 1381.999106] ? rcu_softirq_qs+0x20/0x20 [ 1382.003106] ? __fget+0x472/0x710 [ 1382.006577] ? find_held_lock+0x35/0x120 [ 1382.010656] avc_has_perm+0x3c4/0x7e0 [ 1382.014479] ? avc_has_perm_noaudit+0x630/0x630 [ 1382.019176] ? rcu_read_unlock_special+0x380/0x380 [ 1382.019217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1382.019240] inode_has_perm.isra.0+0x176/0x210 [ 1382.019259] file_has_perm+0x323/0x420 [ 1382.038195] ? selinux_file_open+0x590/0x590 [ 1382.042622] ? __might_sleep+0x95/0x190 [ 1382.046608] ? __fget_light+0x2db/0x420 [ 1382.050595] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1382.056159] selinux_file_permission+0x3bf/0x550 [ 1382.056187] security_file_permission+0x7e/0x320 [ 1382.056211] rw_verify_area+0x110/0x360 [ 1382.056231] vfs_write+0x149/0x580 [ 1382.073288] ksys_write+0x105/0x260 [ 1382.076931] ? __ia32_sys_read+0xb0/0xb0 [ 1382.081021] ? trace_hardirqs_off_caller+0x300/0x300 [ 1382.086145] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1382.090926] __x64_sys_write+0x73/0xb0 [ 1382.094865] do_syscall_64+0x1a3/0x800 [ 1382.098784] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1382.103720] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1382.108753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1382.113609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.118806] RIP: 0033:0x458099 [ 1382.122007] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1382.140922] RSP: 002b:00007fac9809ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1382.148661] RAX: ffffffffffffffda RBX: 00007fac9809ac90 RCX: 0000000000458099 [ 1382.155964] RDX: 000000000000000e RSI: 0000000020000040 RDI: 0000000000000003 [ 1382.163269] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1382.170556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fac9809b6d4 [ 1382.177992] R13: 00000000004c709e R14: 00000000004dc828 R15: 0000000000000004 03:39:23 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeff7fffffffffffffff11e811d497265dc4087636f378e0eb0cbb0d090000005500cf89a0fc818ec4278c9cce6e44b88d3063f1699af1c3e6ce719a140858f8ce63f03f8ef3ed77e0a2d4e17d0237a84187c459466e6bdaa28e6fbff0ed2e"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2200, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0xffffffffffffffda, 0x8}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r2, 0x7fff}, &(0x7f0000000240)=0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[], 0x0) 03:39:24 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4703, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:24 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x14) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810005, 0x0) 03:39:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:25 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x1, @bcast, @bpq0='bpq0\x00', 0x0, 'syz0\x00', @bcast, 0x4, 0x6, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) msgget$private(0x0, 0x100) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2001000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x505, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="01040000d07199816c0ab8c9ac25537fb404da9118b93e159f726e6e04f2b278966a77eafc8e252b27db9356f74aa995a8dd0421c8922bfecf094a3063b3030a7acf1945eea7baa7b94949b8f39bc157b52f90928170d6547971e9fd21b89057856aef6fee2bbb6c8e8d5b042843e1ecdd24e5d0c62a2038"], 0x4) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000003c0), 0x4) 03:39:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4800, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) r2 = accept(r0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1384.299818] kauditd_printk_skb: 127 callbacks suppressed [ 1384.299844] audit: type=1400 audit(2000000365.776:26721): avc: denied { map } for pid=30828 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1384.445029] audit: type=1400 audit(2000000365.816:26722): avc: denied { map } for pid=30828 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:26 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1384.643908] audit: type=1400 audit(2000000365.826:26723): avc: denied { map } for pid=30827 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x2, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1384.797515] audit: type=1400 audit(2000000365.836:26724): avc: denied { map } for pid=30827 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1384.972951] audit: type=1400 audit(2000000365.846:26725): avc: denied { create } for pid=30830 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfff6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) tgkill(r1, r2, 0x1b) 03:39:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4c00, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1385.143622] audit: type=1400 audit(2000000365.886:26726): avc: denied { map } for pid=30828 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:26 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000040)=r0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="8604b2357ebd00ce6c556a4d71203a9c443d5b245d292795bc") ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1385.303293] audit: type=1400 audit(2000000365.926:26727): avc: denied { map } for pid=30827 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0xf, 0x8012, r0, 0x0) [ 1385.531928] audit: type=1400 audit(2000000365.926:26728): avc: denied { map } for pid=30827 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1385.671896] audit: type=1400 audit(2000000365.966:26729): avc: denied { map } for pid=30828 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1385.811796] audit: type=1400 audit(2000000365.966:26730): avc: denied { map } for pid=30828 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:27 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x16, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="739772c6"], 0x4) 03:39:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6800, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:27 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0xfffffffffffffedf) 03:39:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xc0}}, 0x9, 0x1, 0x9, 0x400, 0x1}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x0, 0x1}, &(0x7f0000000200)=0x8) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:39:28 executing program 2: socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x2000004e, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:39:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6c00, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:28 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffda3) 03:39:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = getpid() r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x60000, 0x0) write$uinput_user_dev(r2, &(0x7f00000002c0)={'syz1\x00', {0x40, 0x5, 0x2, 0x81}, 0x52, [0x16, 0x7, 0x0, 0x200, 0xfff, 0x8000, 0xa0, 0x2, 0x0, 0x40, 0x965, 0x5, 0x100000000, 0x100000001, 0x0, 0xffffffffffff18ca, 0x1ff, 0x1, 0x9, 0xf6, 0x8000, 0x8001, 0x400, 0x5, 0xfffffffffffff000, 0x20, 0x0, 0x3, 0x101, 0x411, 0x2, 0x7ff, 0x89, 0x2, 0x1, 0xb0, 0x4, 0x1, 0x6, 0x100000000, 0x0, 0xffffffffffffff00, 0x8, 0x6, 0x5018, 0x64, 0x6, 0x1f, 0x2, 0x6d2, 0x8, 0x8001, 0x100000000, 0x40, 0x3a08, 0x1000, 0x2, 0x6, 0xeef, 0x9, 0x7f, 0x3, 0x0, 0x9], [0x5, 0x10200000000000, 0x800, 0xff, 0x9, 0x80000000, 0x1f, 0x4, 0x8, 0x10001, 0xca24, 0x7c, 0x4, 0x800, 0x6, 0x8, 0x7f, 0x6, 0x9, 0x40, 0x4, 0x1, 0x4, 0x5, 0x40, 0x4, 0x2, 0x3f, 0x9, 0x8, 0x2, 0x35, 0x7ff, 0x2, 0x7a9, 0x9740, 0x0, 0x8000, 0x37b, 0x0, 0x2, 0x0, 0x3, 0x7, 0x5, 0x5, 0x6, 0xfffffffffffffffd, 0x80, 0x3, 0x0, 0x7, 0x4b86, 0x81, 0x800, 0x8, 0x80000001, 0xdfc2, 0x7, 0x1, 0x2, 0xd3, 0x8, 0x300000000], [0xfffffffffffffb00, 0x100000001, 0x28, 0x5, 0x5, 0x20000000000000, 0x7, 0x4, 0x2, 0x2, 0x7ff, 0x80000, 0x8, 0xae, 0x7fff, 0x200, 0x6, 0x2, 0x2, 0x0, 0x1, 0x3, 0x8, 0xca1, 0x1, 0x8, 0x7, 0x80, 0x2, 0xe32, 0x0, 0x0, 0x3f, 0x2, 0x100, 0x7, 0x40, 0x80000000, 0x0, 0x100, 0x1, 0x10001, 0x9, 0xfff, 0x80, 0x2, 0x9, 0x4, 0x100000000, 0xaa3, 0x1, 0x8000, 0x0, 0xdbc, 0x3ff, 0x5, 0x72, 0x10000, 0x190, 0x4, 0x7, 0x48000000, 0x0, 0x1], [0x8, 0xfffffffffffffffe, 0x8, 0xffffffffffffff81, 0x88, 0x10001, 0x8, 0x2, 0x101, 0x100000001, 0x100000000, 0x9, 0x6ec, 0x0, 0x3, 0xbca, 0x7, 0x7ff, 0x4, 0x0, 0x4, 0xabc0, 0x100000000, 0x7, 0x9a00, 0x9, 0xfff, 0x2, 0x4, 0x4, 0x3ff, 0x9b2, 0x3, 0x8, 0xffff, 0xffffffffffffff94, 0x9, 0x25, 0x5000, 0xb1, 0xffffffff80000001, 0xd862, 0x3, 0x0, 0x3c, 0x100, 0xaf6, 0x7, 0x0, 0x20, 0x9, 0xb0, 0x6, 0x8, 0x1f, 0x2, 0x6, 0xfa9f, 0x0, 0x40, 0xffffffffffffff80, 0xbb, 0x6, 0x2757]}, 0x45c) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x4) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:29 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) r2 = memfd_create(&(0x7f0000000400)='dev\x00\xcbh\x80\x87\x1d\xf6\xbe\x8f^K;\xf0z|x}\xd3\xc7\xc2\x1c(\x05\x91\x1f\v\x87(\xe8vB\x87\xb7U\rhI\xb3p\xc2\xd8\x809\xbex\xee\x97e\xe9\x93\x85\xe4\xc6g\xcb\xed\xeak\xdb\x96%zx\xed2m\xe7\xdbK\x93\xc7\x96BL\xe9\xeb\xb5F\xc7\x85\x9cwe\xf8\xb4\xcd}\xf5\x89W\xf9\"\xf8\xba\xfc;#\xa7\x18\xa1\n\xd3\x9e\xdb\xbfO\xff\x00\xc8=\xb9A\xd69\xf6\xca\x80\r\xe9\x01\x88H\xa9F\xb8r_\x9b\xa0\xb7\x1e\x1bp\xe1 \xaf\xae\xb7\xade;\xab\x19:TU\xf9\xe8W\xf9\xc0|\xc6\x03\x05$\xe2w\xbc.\x17\x03\x91\xaf\xca\xe9\x95\x82\x7f\x03|\xe4\x0fhT\x9a\a\x92o\x98\'\x84\xedP\x98\xbf@zo\xb1f\x9d\xef\f\xc3\x8dp,\'\xad\x14\x1e\t\a\xfa+q\xd8\x1f\xf10#\xc3\xf6\xdf\xf0\'Fl@\x00\x00\x00', 0x3) fcntl$addseals(r2, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(0xffffffffffffffff) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) ptrace$cont(0x1f, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000380)={'team_slave_1\x00', {0x2, 0x4e20, @remote}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={r1, r3, r4}, 0xc) 03:39:29 executing program 2: socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:39:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7400, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x16, 0x0, {{0x1, '-'}}}, 0xe) 03:39:30 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x20) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:39:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000080)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000011c0)={0x77359400}, 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000001200)={0x1, r1}) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f00000001c0)=""/4096) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7379043166e4f9b597d06d9f48dd5474bc71718c8ca7aba6177bfb4bb7db6d54d28643d08187e78720c0"], 0x4) 03:39:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7, 0xffffffff, 0xfffffffffffffff8, 0x40, 0x0, 0x3e, 0x3, 0x37, 0x40, 0x345, 0x4, 0xfffffffffffff605, 0x38, 0x51b7b3d2, 0x116, 0x0, 0x6}, [{0x70000006, 0x1, 0xffffffffffffffff, 0x0, 0x3, 0x1de9, 0x6, 0x4}], "d4dcb355eb1ef8ad86ba3db102dec1b648b4dcfc717dd373c07a25e926ca7341373307566be660e6a8c67a2f89a1ed50769126b988ee0d30d2fdcc35782d3b5732acc7e0c3e9cfa7822e01f4f8de23a9d7e41b798c9749c4fecdb17df02c6400912c7d9e1ad3e1deb456129e993ffb3c10b3cbd19038ec200d48ce9b741b12051fd454ec4a81d55a37d8cb5a41e26427a63a70", [[], [], []]}, 0x40b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x79, 0x40) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000140), 0x4) capset(&(0x7f0000000000)={0x39980732, r0}, &(0x7f0000000040)={0x7, 0x4, 0x7, 0x0, 0x101, 0xcf}) 03:39:30 executing program 2: socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1389.380007] kauditd_printk_skb: 132 callbacks suppressed [ 1389.380021] audit: type=1400 audit(2000000370.859:26863): avc: denied { map } for pid=30913 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) [ 1389.553810] audit: type=1400 audit(2000000370.859:26864): avc: denied { map } for pid=30913 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1389.746710] audit: type=1400 audit(2000000370.949:26865): avc: denied { map_create } for pid=30916 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7a00, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4, {{0x1, '-'}}}, 0xe) [ 1389.897042] audit: type=1400 audit(2000000370.949:26866): avc: denied { map_read map_write } for pid=30916 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x109040, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000140)={0x0, @raw_data="7f64764551ae4a9f63e1b81a3f447bdb872914f3b1901509627b7c84b1ca92a32b19b71bca40f63de13d9d3c8962b31314933048a541fbb0eae338f7cc640bc0505633ee1b1799f456e7e2a4e6227ec11dfe590a944436bc3b414a3d0375055e491a43a04430ad0728e1279f41e8ae8a9a366be71e33b743591aaa9105235d1191626c3b8a6d6b4fd7df43c5a86cb7a0a75d3f55e55df3b87a0852d2fa180a40023af6b0ac8dccadb438f564334445344443d6c486c2b1d21649e4747c5f6f3a916fa218fa634715"}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1390.038151] audit: type=1400 audit(2000000370.989:26867): avc: denied { map } for pid=30913 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1390.166118] audit: type=1400 audit(2000000370.989:26868): avc: denied { map } for pid=30913 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1390.342873] audit: type=1400 audit(2000000371.059:26869): avc: denied { prog_load } for pid=30916 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:32 executing program 3: readv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/86, 0x56}, {&(0x7f00000000c0)=""/241, 0xf1}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f0000000240)=""/1, 0x1}, {&(0x7f0000000280)=""/51, 0x33}], 0x5) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000340)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x1, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x6f, 0x1, 0x6, 0x6a6, 0x0, 0x0, 0x0, 0x1ff, 0x63, 0x38, 0x1ee, 0x0, 0x8000, 0x20, 0x1, 0x8cc1, 0x100000000, 0x1}, [{0x60000007, 0x0, 0x0, 0x6, 0x0, 0x10000, 0x2}], "b9a7470ffc9d3a6961fa874273706023ae0db5ed3f547003ec292cd857db9336ced476eb3672843f95b98cdd9f0002805c79330df4155aa15bd13703441161bf49d5e2feae8ce13fb13dfb3da8addbec36c285b4304ea8796d3aefe92d93eb286ee29abcec05621f701176eff1b392db4a45f2e4f67f839d112caf610db65245d88bad92d26418a66b9f12c63dc5377ca508964b21eae4d8960e014c72fb3d85035fb805c4080e6b3756bd6ba69d0e56eb98161c84b81678df0f6394db94c70aa70c54adf2b71f7c20b39c81687f628325048f8db06f13b1fda0e43a8fc0bf06bb9a5bef4cbb27f9836bb14b3faf", [[]]}, 0x246) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f00000008c0)="0b8082cee5dd546b15d012cb8f6cda3e12e23d8e006a070180d0656cef5ff9e7fc3ea3463a8d0fcf2aff0a13ab4a6ae9f30b1341e7803d38a2da2ff5eabed71a93a340668a0e08c24c5b5d936a4c1219236bf4ae1734a0f147711832e75204b8ca28f0358093d81db54f1204c70141ed38f5c6b0dd9df0843f3b786a1ae66e23b5fff2be89f93c99cc8d53340444feb350ee71ff5d2785c9fec5f4982b2b0e2c59") ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000980)='netdevsim0\x00') recvfrom(r0, &(0x7f00000009c0)=""/230, 0xe6, 0x0, &(0x7f0000000ac0)=@llc={0x1a, 0x0, 0xffffffff, 0x2, 0x4, 0xd9, @dev={[], 0x19}}, 0x80) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c40)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@initdev}}, &(0x7f0000000dc0)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}, 0x1, 0x0, 0x0, 0x4040090}, 0x0) io_setup(0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000011c0)) keyctl$session_to_parent(0x12) r3 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) connect(r3, 0x0, 0x0) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000001300)="6c17376518c7de38d1aac76e505920a9abfcb2b79507aa81e8301962da6ab52d77782e718d3df3ac7334dbbe5c08556862db724d9eb6633fe4a61ce636c81c08aa1a660161f48b3ee561e7e90765189dff51101d7929f5251de4ba") ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000001380)) 03:39:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) fcntl$setlease(r0, 0x400, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x101, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000001c0)={0x8, 0x1, 'client0\x00', 0xffffffff80000000, "b0fa568831cad9eb", "495d0d2a74d92d2eb59b8591b7b6f3986c0904553ca46210297027d2241589cb", 0x80, 0x40}) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1390.509788] audit: type=1400 audit(2000000371.089:26870): avc: denied { map } for pid=30920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:32 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1390.719336] audit: type=1400 audit(2000000371.099:26871): avc: denied { map } for pid=30913 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1390.870076] audit: type=1400 audit(2000000371.109:26872): avc: denied { map } for pid=30920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7f01, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x5, {{0x1, '-'}}}, 0xe) 03:39:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:39:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x3fe) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3, 0x9, 0x6, 0x3}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a3170b67093f6549cf2c7575d57c892a77eb88847e641fedfacbee284dfe749a29a34c4cf5a6f2907a850ac7735c3d14366926ef3ba715a8e1b06594287d3a51ceddfedeb0015f3f73244378b0719e3f2e5aa76b62ed5114ff6845ef5c63f6bd914b913aaab3c470742bff1ac005d36d3ae7ed3bc5ba2fd09093c507c3c33cd"], 0x82) 03:39:33 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 03:39:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x8, {{0x1, '-'}}}, 0xe) 03:39:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x8004, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x4, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 03:39:35 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 03:39:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xfffffffffffffffd) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0x4) r1 = shmget$private(0x0, 0x4000, 0x1105, &(0x7f0000ffa000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x2000) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x1) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x7ff, 0x9, 0x200, 0x3, 0xbc3, 0x3}) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:35 executing program 3: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000140)={0x1d, r2}, 0x10) setsockopt(r1, 0x65, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) close(r1) timer_create(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 03:39:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0xfffffffd, 0xfffffffffffffdcd) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080)={0x400, 0x80000000, 0x1}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="78312e9e86c3a02ea5caa32b4e5fd5e64820470073797a31cc8fdd24b0efac5c7e216a655afc91d6e3b65cac2b4c3f000000000000000000000000000000"], 0xffffff37) 03:39:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0xff03, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x10, {{0x1, '-'}}}, 0xe) 03:39:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xe0, {{0x1, '-'}}}, 0xe) 03:39:35 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:39:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000280)=0x107, 0x4) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, 0x0, 0x70}]) 03:39:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x40000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1394.635411] kauditd_printk_skb: 136 callbacks suppressed [ 1394.635427] audit: type=1400 audit(2000000376.122:27009): avc: denied { map } for pid=30998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1394.797601] audit: type=1400 audit(2000000376.182:27010): avc: denied { map } for pid=30998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x170) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x3, 0x80000000}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1394.923487] audit: type=1400 audit(2000000376.182:27011): avc: denied { map } for pid=30998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:36 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 1395.050424] audit: type=1400 audit(2000000376.182:27012): avc: denied { map } for pid=30998 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000e89900aafe4672d82b166197f7ffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1395.244920] audit: type=1400 audit(2000000376.262:27013): avc: denied { map } for pid=30998 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1395.370540] audit: type=1400 audit(2000000376.372:27014): avc: denied { map } for pid=30998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfc, {{0x1, '-'}}}, 0xe) [ 1395.596867] audit: type=1400 audit(2000000376.412:27015): avc: denied { create } for pid=31000 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1395.722504] audit: type=1400 audit(2000000376.412:27016): avc: denied { map } for pid=30998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000900)={0x14, 0x0, 0x404}, 0x14}}, 0x0) 03:39:37 executing program 5: clone(0xc000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1395.948188] audit: type=1400 audit(2000000376.462:27017): avc: denied { write } for pid=31000 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1396.064924] audit: type=1400 audit(2000000376.502:27018): avc: denied { map } for pid=30998 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:37 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:39:38 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x346, {{0x1, '-'}}}, 0xe) 03:39:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x6, 0x7}]}, 0xc, 0x3) 03:39:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 03:39:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x2000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f2d649cd3"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='f2fs\x00', 0x404, &(0x7f00000001c0)='user\']\\\x00') bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x7f, 0x10200000}, 0xc) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:39 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) 03:39:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000080)={0x8, 0x3, 0x7}) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0xfffffffffffffe13) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x347, {{0x1, '-'}}}, 0xe) 03:39:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:39:39 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000006112bc0000000004e686d10efc009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="6939fa38f5e241c6f1797aa48fdb168594e0845c01a85018bffbb2dc4331a7bf601a3706ce0820753955f84400ca278caf0c2b9f063c", 0x36}, {&(0x7f0000000140)="02197ef1fd4dc7d00fb54d489bb26d610aa86c6d4a2bc4b46f647ed383425abe9104d88060d2aed1e5e672bb29d6dc6474dc3301fada1352f9daeb21f5a09db40db710a29c2bad18f067b0b3152f25c79bdcec1dffd5cbf5ef05f1461b90400594473d8d2ee1b74bc469b0fa485d0510d6cc7460636ae670a53b224149da5a1bb0866b16a51f482ee611fdcbd0491871bbd41556ae1b25141ab8450e4b1eeb4a0815a4f743e2daf2d3bd93339a86552ec24ce0cc1cf3028af5663762261d7404745e929104c9c497ab83b4cba23d3c2bd73f84552c36414265ac9b32a33227e073c28467e386a01a65b6be36ed6bca149dac6445e39736fa96caa6b891f16cf111513068f1b308949b02d51eb1bbe5fa16446e80d2dc3ceb40f84498fdffa83e2a72f015fea1799cf6931bc23786988d365ef12e91764e82f6fbd353ece8504d8061b3a9fd94dddc76839273248aff8b194799942975fd81279bc5d9bec326b9a0d8dd72a0b99445908991673dce61f387e1b9f52566d147d79deea0b32e10c5467dbbbb2f7fa7851a7cf3bf68f889c8120f815394100987fc7188ec09e95a5a286dedcceeedc6d1ecb742d02af4a1a1242908fa4223576dc48a3f48cdf3bb7a45e35a665599dfc3a3e4dd16a4378ef8369453064c6601215c81efca9fcec3ccfd572919b8907fe33d8f833dbf7e00ab14c9ed6cde8e43c849758835208cfa16a0b44937bcccca60aae98c1a8a282fa4b76b21c3c3bb6743dc6b5ca74496aa84ae06d90f9e094676e678ed27dac3f021b8ce01cb2c833559205394c3125046943f13a122d651d669b9fccadb736121a646c5627ed08a43e908158acfadf2b101a4983997e1f1450c3774e4608c2b2431620d45289e646e03aa0f5c14a9978cf2f85f6119c7d337b72d49581876909385a2797fb59643d1a160059de95f05ad968023b11d7e4229f9efad259e1c2fb1f536158beca2b9e3b6d6ddfe5e606afa36e962b736dbf96e1bd7748487a5d3049246ba44bdd13c0985ffc62626f1fe533f7ea1abf9269494e7335a4dc013b83f7ea113add835dda5999c839ecf5caac808c1b8c1304eb9811685dca922bc76babc638081652bbe56c0c6e14bb338fe2ca4034afc268c875213c79137fee481c182c3335b0646e04bac2382ab915901a364e43c36e551cd9e9b10de89812edc64e340a45984ba0c4c6d335fb55ccde05333f7772e5331d81edfecde333b8a92ecc74513190c741edd85057b0ce25f34694fa3522343c917006497c5d1949b4225c350e98df39016562db3019c4400c6dd14e755227c4a73204825f379c1735e91c6de1ab7db937cc45095b487e46143e952cd14882ba637fe743f67443b2dc25e8118a257dc9dad4145b9c61438b6b6984a100176743c79c12401f3858f1f7ac7664e00f440092f1c9159bb4757aa6e1268ec8ee09cc5fcaf9151de54c9c3fd4ced32cab30354a62745a1c524771678f0ffa0bde7d7fe0b82f9a5a4f7efeac6f662395651488c8ea9af95b75bd6cda84dbed9ed4d1396c5c3893ba6bf6a0f5aadb82dd2a915739595e7109914aa0d29f304988adc1550856df656c07a3f84fd850a9e193af10e991cfa4a488578d135169bcd1f22b715ba95c3fef2a2e6a55056221ea51e50c7ff7120b72b89e3e4e1d665d7f10c6345667f0f2a7ddc10a6226d24d949d3f3068d5d285dafc226b42460365f18b299ccd889fcc57a15130f86744b5f133c268f143aa9839c7cedd2b9b456e07abc1fb0d4646e8f12de8bc84a3c3ac48fb70cb70e1a212a9fdce495cc104889001e738332290b3e7f5963865c63487d787b8255a9b2856e4f3db534be34364fea018ffdc2c1feba264dc94a1b0a36bae47bb813089081c0cbcae8ee3e057504e55077dd2076dc0ae3786f8e0d27efd287c582f13b5f5f0cd9751b15d8626e71ee03f7cef5ab1ac4babcd020c8e5568519ef07d4a64534d7a173b23db1a188559a3fc77961ace38b81476af992b7dacf282568986066b845a984fce849b53b5f548a6f1d669a81ff41adb8c048c517093076c67091d3b36fdfdaaaf1f955659b079c05cb246c4a0691eb4db9a1eca549782426b8a95e8e77d25c754879d5189e8257063d9078d16f5431172ff77d053f6e6d4d350602176f2b57df51a65e2390e70b0180d7574015a3614f432693ef6241dbb1f04783bfc0c663bba670ae315d05a321b9541df2edb28a6a77923f4cd9a7c69e3c3e087bc4cf5e0480e2661a383058b831d42c9274455aea63b6a45476f92659a7f9b2cf98513a22dda175137db2238b7ea0ccb03e60a3391962c5953925f2579df53a4ddfe831d24811c886146cf0ee1256a0ead8cf915e793414dbdfa6e3cc552310429be7581512475191c71c3cbb2e5ce9a25e051393569602e20d0869fe05b24dab1a13ebbbe1b44d5da1e646c64bdd872a73e91e5ea77604f37ed5f9ab9ee71fb7928c0abc82d03db9c56c2f39e14d6d5c811ab901c69f9cf4bdbcd31e05aeb030fdf83815f8065c54f74bd2b2b3b5162c954c3cfe01bfca386c63da128fde00b4f0d7ca1574a35cf20715daa88a79434839d5da72411bbc0d44992b3336f4fda08f69a05d242ce920c696c67773a1ad988ea35a274ebc1c2aa9f03d10c74cf65731512aefb674fe2d55946da98cd104f14ff2b4c17e41e9f28bf935793430253aff7c16d7f74e98157f3ab4ef1a5ff4f5732db27bee5347826a8f2504f7a3d860b5a3b8809d7faa18c02f1dc0eccb001a251357e7223a3623198d9e2df68dbbf67cd421286bb90473d1110038f3b1cc1166d7e40c83c70bd27691ed1a6d90115fcce79c5c0f49fe598dbe9c720c4bcbab39daf7044f3aaa0ce2ead5c7994705b2060517a24b7bdafb48482cf085a030b072abb0f85ebd1e66846d1242448768850c6ff72df85624663f0969a636fc280746db2483b66048a66a2b3b9252e908bb1b964b22ec17335b909b9f69c3aec66cf4c081cf55a131298f34e3fc7e75b91dc4e582acceaddfad12b4f2bee81e8c0bfa92a06d154963616f31465df11091c5b7b2ad5a322d7247f82f1befcd512312ec89e78d69379b71bc46d8f12e22dbb8c4d231325e546d80b3c34856d924354ca6108d1b3641d32012e689c5ba9f9b986b5f363488974db4d63d181ccdc33dfa571f0d3b8b314f3d99c3689e2e2efeacfa97aa2d1d4b4d1f3e677f00710d7bea2e5d4616912325deff718af2961c8d679291ef094ba1cb72281ea6032383e964b719996e384d5ee803b24631a2d24c4bc35d6692adab1bbf4ccb335d20cbb1dc6f2bce9fa4fc49a33b38b4078e56b3bb935097a753f31a0e139a651ce0bf4589d6d49811c1880bf11763baa51874dfc4642dd67ad6b1f5287561e796b195a24e6900e3836b99e54b10ecc7819de8d37ce3c5a71511723b6b7649d9d0d73559cb9a9125ee75ee3ab7e0246351e3caf2b27c8ce60bb95358610783be4b93dbbb695b1ef97fee7b7e1670f1d30fa3cf7b669dd1ff4390356f29b47f901697bf90ea8a1f21b575728ad9ae0bb64d4df3fd3c776df605892346ce784db382fe222371d9ac13988065ceb7af646b77a4496e308de7dee3953b3ce60d1d3177be9637b27be978124382c4e500c64b9d91df796539d94205273dc12ff903eb39e26fe4b222a86ae959b87e92513ae6a0ee322b7ec30c87dee8a256d761d8abc1525a01ed968a54e7e1fefffcf8e962ff64e5714c8fee76e38d9c83543944543f454824526f15263438f4187a9687a42b1e191bafbe602edbd98fff25547992fe7ec5f0195808485e765918a697b2dc2bb9dff17461e6b41105a949cb52808d2700aa36e772fe5c3badea7de896ea803cc14cf87f4edecac82dcd2891cb63afbc2e30db76f93e3e158df396de5afadc81262884489d377a53e2e8b98209c9fa839f7006e9c65ffa603d24950315503fe1a5d9dbe7430adf71ecede5817bf7bb449bd99615411b031425695b4ecd97e3ec175a2ea212b21e00a991379a2219e31960cedad0854714cd36777b5af362a11a68e11bdf4acdd68735a7d7bdf9d13a57ae691c5adb0a2218010e815648eccb41dedfc1947e8694a088ac71281a9fed86824e4a2966295cae30eb8487077f76f6129194e8afd5a8d3e053b46545c9e4c5f7d0f58ada8c00d2d823323b5e0981215432818369efaf9c5290682c40fccfbcebff69c849f9f7769a119a612f0d25a59be06e9b14487832eda313f2497d8131d2649b627f326135611219387d92e54ca401adbf3ba0544f87c95f0d2833cbb3b67ff31fdac226f0411d9f99a76c1bde4e91228276ad6bb4b495869c87d39cd2bc604337063d8acdec6b0456734f075e14164034e6405f9349949210cd5dad7aaba745b9c233679472346be5a6d866300c5d0b523e7b4c9df17d46f3a7a6e49f3c8b52f58b5d6556ec035f87216548dea11d9aaa41baeeb7543ef48e737a648ad815923c7ef798d8224d9271ee663c7e66fcb38402a82e84ecf11a7e8af2b95965f743b7911abf018b5ee5059f2b6ad2f7224eb997616be8752efa941309cbd37b551f170ebed7909a528c6115a2fc33a25d4cf9b6bfdc84121e65d4a6834d6aeec032deb13a7db127061da979eea8a04bed1359c3ad0e3bc560376eb210906312951a05c783ffcaa9a06ff6c0045f8593a7f454058ed42c9a8be9f21934931c8885799581d3e9189f317d1d8707105d1fb5df9215d105b79b15fccfb9220b358ff08d39732555ec86e073ec0baaded3a22fefe2f13d874a7c2cb774afa05c06a11247d2b139dc8ac286815b43e7878a79187396006bcf5244d285da7edca9e3b83733dbc544ce1321af8cc12557667be406b8a5ef9cf8426a59e8b48ad27f9d4d40cd39cb167665fb674b0ee02c0c223a81d68e8467a1f4a9621bdfd6da83193b147c2ac3b97a6df7f6844281df4ba9b33cea9e9ea35e5f3d0c7aa70002287f81ed86b222136e0d6f97a56c541c7a60fc83a8e2b3590d5e04db6b62735eb39f714178ede6c380e75ef89b95783431e495931984f57720515a11ccaff38fc04b85fd6f3d4dfc056f3e35ec18ff3fda2ffcf7208ddefa06d6bbb223c79a0939e3c1ba175fc4770767cab44d7a629e6fb0373cafc8dac775ddb5e6ee9b20d65e9553954ecaa5172ec9671bc55ee1ca7eaa98c495be7f1ced90204823082fe0b944eabc4f7ad48b38bcbe4828f829863bbefaf86c191b24d718a7b4c05a1ed3d1122329c07bd856306b76d53e8e8df1038bfa58930bb418b468e3415af3b4c5cc49ad8d7762ebe9be8ef808ea3d441fb82437d6bebde4b171ceabeb85f8bde56924bf46796895367c81accf7d690d3d818e7b3571895b51975afe8a15305f0e75e057403a39fc735b99bce9e10a8ede31abc2bffa0f4f51acf516598caf9f4307ad3ab4ab2743cc08baa3e773e151efc262a8d1f626fd2a81178da309929c4da9c9ef2fd5d1c85bab2dddd85c9db643aa84d0d414da0dd3b2ccc80123008bf30182455241764cd9921e7d25dcae9f805cf13d47ea53587a44c854500ddf9375e607301159169168358cc19e65ab10403dd8f9ca4e654bd943d4d1bb18e11b34bccaae8732df3e71105ef91aa0cb04fda67341120cb1b960a0ac972e4aee2eeaf8a49d422a444490a276ef649d9eda3c4f4562212378cdbb3c02607de26919ee02715b6ab18302b3c5937e37acab4f24604e2a78eb68048d78e6db9484083b8cdacecf496e3ca0d2b793c14a98f65c6b30b0622ecebea19e6704fcd8c9b8", 0x1000}, {&(0x7f0000001140)="6cbf3eeabec9c9bea3eb9b9c0d8febedbbe9245249cba12b46c71e8f73e47a6e43502e8318396b37f1af33105eaf17ada64c9811892bd6baaf09483bd0fb6ae31bc548c2fa9d8dba11c464979b34bdd897165ed736ee6c2bed3049d5cf3d60cbe1eead8437505de982fd41690c1e6da4e3fe509f3710973ff03fe46600b54923ff92102a12dc52410d881f357a7f8ae4f3065d4f0ca6b34ec644e7b6c1a26293f90990dcb2c9e72908c85d8c2bb8ad9590683200aa613221c2bf126dcd7e94813a01b29bf7030678fa4b88750bef54acfd6ac884cda8dacb6c473e92cb7e21368378ebf3c4bf35f9efbb1a2212fa3e17d52662552354543a", 0xf8}], 0x3, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001240)='/dev/btrfs-control\x00', 0x501180, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000001280), &(0x7f00000012c0)=0x6) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000001300)=0xe5) 03:39:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x3000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:40 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) 03:39:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x500, {{0x1, '-'}}}, 0xe) 03:39:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:39:41 executing program 5: clock_gettime(0x7, &(0x7f0000000000)) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000240)) openat$cgroup(r1, &(0x7f00000001c0)='z2\x00', 0x200002, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x7, [], &(0x7f0000000140)=0x3}) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000880)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xa}) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) sendmsg$tipc(r1, &(0x7f0000000800)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000380)="4e6cce65046d7d87277a933c95a188c5a0a0e36da747557e461823871d7fc20811250315c1f0d4b50de0437ec62b3593158fadbfc2e25b8e4582b31541fa", 0x3e}, {&(0x7f00000003c0)="87fec6c72573c631bbff8b2f62f43912546369ebdeea1b249f26b8d5a94d768d7f7dad3da9acf95b1e9d08733765944d67aaedaa31c0fe91824be819fc09ccd5ba893c6d4038ac0a446fc99a575564eedfac", 0x52}, {&(0x7f0000000440)="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", 0xfb}, {&(0x7f0000000540)="fbeb4ef4188549bee081299c3f37951080e43beba3025d1501e1006211132afd60cacfbe992c6d44c2c6d5ebaaff06ef20e1a83ae5f67aace223bf497714bcae5fd6eb8157a77a738522e6d13366a286a1946b54e4a371d153de18262a8b17b6fbe3dea4e26d9fe78457fd84c5dc74ed80392954a9824ca4d1b3c68a453c5154a6ce826e7e6e3f0b4f70debd5f1a14685bf1abc44371b11cd4b682fabeb6dd12932401f28a3d9103f15ff3b1f51e", 0xae}, {&(0x7f0000000600)="5189dd188b23ca26603627cb2f36ec1917e543934904b8e586e9dc82bdd55508c66b914e28622448fe2ce9243c8a0a56de2b93844cd602ed4f7aa0ac4d6f2d8f1748f88b91ab26bc223d7903f18b8262865817e2666c66078cd662268a7ee2d36eb17faf18107921d4ba3cf0a2a181ef6a00608ac9ba32bf4f588ee28fc168a70cc32bdd3734e17b285a235354edb121e0df3abd30df93a8ebf0940401512aef9882f6c6c67114cbdb87d4b1e07cf581e118122c5dfd8f93fcb766c93fe14b", 0xbf}], 0x5, &(0x7f0000000740)="7ca193b998101f6c6daef4039ac83b6bb604bcd5af2360b24780e10fb61db713e991a2037b3c42b782f76d79d8d5c7bd9b1fc491b1c413f6703996dc73e5bf346c84f556897cf7d2b84851435e87c733f5d55f7ee08f40eaf80b1a4493eac1fa4fe95302ea3e5a97a188778e242470085ea47cf7cc37d0755b30710be97c7114ece832e43a7008aa81a7f5b0153fecc1791f", 0x92, 0x40}, 0x20000805) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000280)=""/197, 0x4000, 0x800, 0x6}, 0x18) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000840)={r1, 0x1f}) tkill(r0, 0x11) ptrace$cont(0x1f, r0, 0x2, 0x0) [ 1399.636782] kauditd_printk_skb: 140 callbacks suppressed [ 1399.636812] audit: type=1400 audit(2000000381.124:27159): avc: denied { map } for pid=31078 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:41 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) [ 1399.844756] audit: type=1400 audit(2000000381.134:27160): avc: denied { map } for pid=31078 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1399.993113] audit: type=1400 audit(2000000381.154:27161): avc: denied { create } for pid=31080 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1400.142498] audit: type=1400 audit(2000000381.194:27162): avc: denied { map } for pid=31079 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x3f00, {{0x1, '-'}}}, 0xe) [ 1400.290205] audit: type=1400 audit(2000000381.194:27163): avc: denied { write } for pid=31080 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) open(0x0, 0x0, 0x0) 03:39:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531721801cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1400.433062] audit: type=1400 audit(2000000381.204:27164): avc: denied { map } for pid=31079 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1400.594414] audit: type=1400 audit(2000000381.214:27165): avc: denied { map } for pid=31078 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$peekuser(0x3, r0, 0x20) tkill(r0, 0x33) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffff7fffffff, 0x101800) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r1, 0x81, 0x3, r1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1400.726907] audit: type=1400 audit(2000000381.234:27166): avc: denied { map } for pid=31078 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1400.874546] audit: type=1400 audit(2000000381.274:27167): avc: denied { map } for pid=31079 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1401.038332] audit: type=1400 audit(2000000381.304:27168): avc: denied { map } for pid=31087 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:42 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 03:39:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x5000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4603, {{0x1, '-'}}}, 0xe) 03:39:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x3, &(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYPTR, @ANYBLOB="e6cdd60273e32668f3e01fdd5091c2751650"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = dup(r0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000002800)={0x18, 0x0, {0x4, @broadcast, 'gre0\x00'}}) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000240)=0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x3c) getsockopt$nfc_llcp(r1, 0x118, 0x7, &(0x7f00000001c0)=""/113, 0x71) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x4b6c3d89) write$binfmt_misc(r0, &(0x7f0000000080), 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 03:39:43 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x23b, 0x0) 03:39:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:44 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 03:39:44 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4703, {{0x1, '-'}}}, 0xe) 03:39:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="92", 0x1) socket$bt_hidp(0x1f, 0x3, 0x6) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:39:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x8, 0x1) write$capi20_data(r1, &(0x7f0000000300)={{0x10, 0x2ece, 0x83, 0x80, 0xffffffffffffffe3, 0x7}, 0x2d, "73957661bbd6645555189b30261f2353fdfa64b1fe249bbede3540225f31a1b01456e87fc7f38e44a36ca561c8"}, 0x3f) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) r2 = semget(0x1, 0x6, 0x261) semctl$GETNCNT(r2, 0x0, 0xe, &(0x7f0000000140)=""/24) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000240)=0x80000000, 0xfffffffffffffffa, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000001c0)=""/124) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1403.877998] encrypted_key: insufficient parameters specified 03:39:46 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1404.688927] kauditd_printk_skb: 130 callbacks suppressed [ 1404.688943] audit: type=1400 audit(2000000386.177:27299): avc: denied { map } for pid=31158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x80fe, {{0x1, '-'}}}, 0xe) 03:39:46 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 03:39:46 executing program 3: 03:39:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x8000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x4) [ 1404.852850] audit: type=1400 audit(2000000386.187:27300): avc: denied { map } for pid=31160 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1405.000515] audit: type=1400 audit(2000000386.187:27301): avc: denied { map } for pid=31160 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xc0fe, {{0x1, '-'}}}, 0xe) 03:39:46 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)}], 0x1}, 0x0) 03:39:46 executing program 3: [ 1405.162102] audit: type=1400 audit(2000000386.187:27302): avc: denied { map } for pid=31160 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1405.322603] audit: type=1400 audit(2000000386.227:27303): avc: denied { map } for pid=31158 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1405.481977] audit: type=1400 audit(2000000386.247:27304): avc: denied { map } for pid=31160 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="00060000"], 0x4) [ 1405.605331] audit: type=1400 audit(2000000386.337:27305): avc: denied { map } for pid=31160 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x18100000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:47 executing program 3: [ 1405.781825] audit: type=1400 audit(2000000386.427:27306): avc: denied { map } for pid=31160 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0xffffffffffffffff, 0x3) [ 1405.902229] kworker/dying (2587) used greatest stack depth: 18168 bytes left [ 1405.971872] audit: type=1400 audit(2000000386.447:27307): avc: denied { map } for pid=31160 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1406.129945] audit: type=1400 audit(2000000386.467:27308): avc: denied { create } for pid=31161 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:47 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)}], 0x1}, 0x0) 03:39:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xe000, {{0x1, '-'}}}, 0xe) 03:39:48 executing program 3: 03:39:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x19020000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:48 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) migrate_pages(r0, 0x0, &(0x7f0000000000)=0x40, &(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = syz_open_dev$dspn(0xffffffffffffffff, 0x7, 0x4002) mq_timedsend(r1, &(0x7f00000002c0)="8d32ce906e076308840d537d50e25e07095ace5a76857326971eef82ef577bbe1c448b43a302648445c8589f90", 0x2d, 0x1e7, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0xa00) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000180)={'vlan0\x00', 0x8, 0x1}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000280)={0x0, 0x3, 0x1f, 0x7, 0x9}, 0x14) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'ip6gre0\x00', @local}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x1f, 0x1, 0x4, 0x3f, 0x0, 0x9, 0x800, 0x0, 0x7f, 0x9, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x1ff, 0x3, 0x9, 0x100000001, 0xff, 0x19, 0x9, 0xffffffff, 0x3, 0xbbd6, 0x6, 0x9, 0xfffffffffffffff8, 0x5, 0x0, 0x4, 0x6, 0xffffffffffffffca, 0x4, 0xff, 0xb10, 0x0, 0x5, 0x4, @perf_config_ext={0x6, 0x4}, 0x20000, 0x6a, 0x2, 0x0, 0x40, 0xfff, 0x8}, r0, 0x1, r1, 0x2) utimes(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={{0x77359400}}) 03:39:48 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)}], 0x1}, 0x0) 03:39:49 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfc00, {{0x1, '-'}}}, 0xe) 03:39:49 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xc2200, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0xfd0, 0x1, 0x6, 0x969, 0x9, 0xfff}, 0x5, 0x3, 0xff}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2c) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x400000000000, 0x40) 03:39:49 executing program 3: 03:39:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x3f000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaa2aa421dd731720605cc0d8cb9f1d957d88c830000470590771837dde600aafefeffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0xf2, 0x1, 0x3ff, 0x7f, 0x100000001}, 0xc) 03:39:49 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e000000100003", 0x17}], 0x1}, 0x0) 03:39:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfe80, {{0x1, '-'}}}, 0xe) 03:39:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040)=0x5, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000003c0)=0x6) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000140)={0x80, 0x0, 0x301a, 0x1, 0x3ff, {0x25fe, 0x8}, 0x1}) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="44000001", @ANYRES16=r2, @ANYBLOB="00082abd7000fddbdf2506000000300001002c0004001400010002004e210000009d00000000000000001400020002004e24e00000010000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x300, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008894) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) getrandom(&(0x7f00000002c0)=""/245, 0xf5, 0x2) 03:39:50 executing program 3: 03:39:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x40000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) getegid() setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:51 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e000000100003", 0x17}], 0x1}, 0x0) [ 1409.692176] kauditd_printk_skb: 134 callbacks suppressed [ 1409.692192] audit: type=1400 audit(2000000391.189:27443): avc: denied { map } for pid=31236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1409.873448] audit: type=1400 audit(2000000391.239:27444): avc: denied { map } for pid=31236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:51 executing program 3: [ 1410.034876] audit: type=1400 audit(2000000391.239:27445): avc: denied { map } for pid=31236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfec0, {{0x1, '-'}}}, 0xe) 03:39:51 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x3f, r0, 0x8000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1410.166213] audit: type=1400 audit(2000000391.319:27446): avc: denied { map } for pid=31239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1410.358598] audit: type=1400 audit(2000000391.329:27447): avc: denied { map } for pid=31239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1410.492930] audit: type=1400 audit(2000000391.349:27448): avc: denied { map } for pid=31236 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1410.649492] audit: type=1400 audit(2000000391.369:27449): avc: denied { map } for pid=31239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:52 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e000000100003", 0x17}], 0x1}, 0x0) [ 1410.809396] audit: type=1400 audit(2000000391.399:27450): avc: denied { map } for pid=31239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x47030000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1410.945746] audit: type=1400 audit(2000000391.479:27451): avc: denied { map } for pid=31239 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:52 executing program 3: [ 1411.122614] audit: type=1400 audit(2000000391.489:27452): avc: denied { map } for pid=31236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xa002, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setsig(0x4203, r0, 0x7fff, &(0x7f0000000000)={0x3e, 0x2, 0x7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) fcntl$getflags(r1, 0x401) 03:39:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xff00, {{0x1, '-'}}}, 0xe) 03:39:53 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00", 0x23}], 0x1}, 0x0) 03:39:53 executing program 3: 03:39:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x48000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x800) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/30) 03:39:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7ff, 0x200000) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0x4, 0x5, 0x568, [], &(0x7f0000000080)={0x990a64, 0x5, [], @value=0xe2}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:54 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x6b6b6b, {{0x1, '-'}}}, 0xe) 03:39:54 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00", 0x23}], 0x1}, 0x0) 03:39:54 executing program 3: 03:39:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4c000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4000000, {{0x1, '-'}}}, 0xe) 03:39:55 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00", 0x23}], 0x1}, 0x0) 03:39:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) sendmsg(r0, &(0x7f0000000240)={&(0x7f00000001c0)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000140)=[{&(0x7f00000003c0)="e41f6ff2d471459f80d16171b20655532fafd68f569de23bfc41f982b2298e146cbea066db1d295f44648ba7d572b9bd419f5b557ef941e478f2092e85ba43cda8b64a46c4473ea9cd7e13b4b337a1fbbfa11a3b85dada63ecbb6513e1bd55e0bc64d7763dc949bdf5084d8f9cb7ac9ba9aeacc7d97ef9c4b2a6269f829efb21c3e5b17076d2f9", 0x87}, {&(0x7f0000000480)="55a00dc1c3bd4198e35a5a1ddee316cffbf641ebcf2b206cafde3d705a4b66d2ff90ad56d296e3aea71bd689008637b9f0a1a7ed879e077685dc7d9b83f926cb8809815a2981b09d6ebfab15b55a37145afc83ce48889b5a0881a803f0cd047e61c83e9a25eac2c25d471fd3f5db5acf410c30a06e8b89353ff4c7352a6353fc52caf238a26505be635a5f2e3cb520fc646c11e0c684333b126fd97202b6c5b82208270b26a1fffb037e25c090cfc42dc20ef40327656716f45f6ebd07b9bb1316fc9140e90b2a55476dd86fa436", 0xce}], 0x2, &(0x7f0000000580)=[{0xb8, 0x111, 0x5, "bc7a5fb1e268927e7ef50b573aa1d587b6123a6800dfe680bdafbb8845139543624ba03d8c6dc91195cbe9b9d7267c75cab90e8ebd2ab49bdb203f00f5dcb5037e8e62fd2bf81f2c9b6b60db49a48a0863f35db5adff387b9658ba5a50ee21660118be14a015a25c1d9ef643bfb813c0cb9a12a980f38ebfe13905b19acf7570c0d4439da1bf0b2faf1c701edbb8e0f21016b92c6ae6caf560dc4ffa4da5b43854"}, {0x28, 0x19f, 0x8001, "0766c60ca032a3cf23606aec099303112a418c6beff1"}, {0x10, 0x119, 0x100}, {0x88, 0x0, 0xffffffff80000001, "98ec8f33c2c5f08f7f1903b6f4b406b96fc7cd2b9a471cde1e0f2407ce9daa866cecfdbb1cf1a86bd3ddb9bb583494922192ebb3abbd15beffe6fa77c510d651a03dff4e16dec30dd727db3eaa6c11280dde3e8234ff9b6eba1f98372142716256979bc1593b7ab790676b49c7100db5750d"}, {0xc0, 0x6, 0x20, "4549b6e51640076622296c1b2bb3bfe5b422b49d7de084a7b4358b0d40166967498db4517d23d2e90cf4ed5453d7a33e94e2aada5bd0881ffc18283b3e76e8b9bd183c9c8b438bf615242eb4be8b283e6490d95759b8ed908083bd465ed5706037da1b3c97b80434cb4b4859295a75c5e98d624b9ac69b95ed97f5a85047a13af8eb36fe6188735dae6de12ecf0a81d9d6fdcee12376c573b68d25b9e26dff08bea63e5bd4cd8c8ef4a64b"}, {0x80, 0x109, 0xc69c0000000000, "8aa271dd615c9fb8c291e6b729e2d64fcfaa2839d404da7806a51542764d801490e2ef55a6fe5212190893caa1d80a12f08dc430a2590a2f62ddfd12272d1b730bc71d2c30a38b346a18af0bd9270e24e600c1fc8a2cca7494d2c94c7ab76dcf66cbf14b527e334969679a5bce30"}], 0x2b8}, 0x4044) pwrite64(r0, &(0x7f0000000a40)="fd59325be7e5294771e06fdba914fcacc0045152b6e38c6254eb08a46ad77af8b1e3d4a1849f4ad9c87e0818172148867692f1950fe0d0ab8cf92fcf18e1ef29e1907508c87da7c331235d5e6cda65a799e5311863c1c55c32fa9efe123846bf9a4f52bf51aacf1ad332e50e54fec6cfa5780af19fc9f00405b862895b7b291278beb4ec9ea5339dca0ab03934eedc1fa7a1a790a58f82414af33628c03ccdad1e6958c0ae07174f954b9abb42e76cd39781329bcb4a596396116574b61664eb84bad5018b9b9fa582ad5f7b87ae06d5ed4ff7e7f59f479799d6ad54d3ae892560f5909c1e779bf91d5cae8da41a1bb53c720250", 0xf4, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000280)='tls\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(r2, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000c40)) fcntl$getown(r2, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000d00)) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000880), 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000d40)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/hwrng\x00', 0xc0000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000d80)={0x20000008}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000dc0)=0x9) fcntl$getownex(r2, 0x10, &(0x7f0000000e40)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000ec0)) fcntl$getown(r2, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000f00)) fcntl$getownex(r2, 0x10, &(0x7f0000000f40)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000fc0)='net/connector\x00') io_setup(0x2, &(0x7f0000000840)=0x0) io_cancel(r7, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x5, r6, &(0x7f00000008c0)="9afd769d699e0441bc082d6cf81685f4bc11670ae4774dcd8a06be0a740b20c2e096dab183c10263a5369d1dcd6ac5a6b87f582f19cb9579f2d45fb99b58c9d2bd46c29bd92cc198766f7b3e1c2aff3ec0b58e7d8b27bf444e5d9162d21e7a3bd36569c2f934c562d685016774f567469cc6083a67db3206cc991846d6a45b606d1ae044a3dae67ff71a37f75b62da28c5f72c1df9eebb9301f82dc72051c0c2c41d1f1dc36c219826f41e5dc5d1d3dbcc0873e2e9a70f878e95aba4765d5c7b8b1287eb9b99", 0xc6, 0x40, 0x0, 0x0, r6}, &(0x7f0000000a00)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="73797831473d8f3d4e21cd25675642e7a726d19e"], 0x4) 03:39:55 executing program 3: 03:39:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x68000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1414.703288] kauditd_printk_skb: 130 callbacks suppressed [ 1414.703305] audit: type=1400 audit(2000000396.202:27583): avc: denied { map } for pid=31303 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x5000000, {{0x1, '-'}}}, 0xe) 03:39:56 executing program 3: 03:39:56 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000", 0x29}], 0x1}, 0x0) [ 1414.887993] audit: type=1400 audit(2000000396.262:27584): avc: denied { map } for pid=31305 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1415.047449] audit: type=1400 audit(2000000396.282:27585): avc: denied { map } for pid=31310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1415.193257] audit: type=1400 audit(2000000396.322:27586): avc: denied { map } for pid=31303 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1415.306590] audit: type=1400 audit(2000000396.322:27587): avc: denied { map } for pid=31303 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1415.500979] audit: type=1400 audit(2000000396.322:27588): avc: denied { map } for pid=31305 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6c000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1415.660155] audit: type=1400 audit(2000000396.332:27590): avc: denied { map } for pid=31310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1415.841452] audit: type=1400 audit(2000000396.342:27591): avc: denied { map } for pid=31310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:57 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000", 0x29}], 0x1}, 0x0) 03:39:57 executing program 3: 03:39:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x8000000, {{0x1, '-'}}}, 0xe) [ 1416.030162] audit: type=1400 audit(2000000396.342:27592): avc: denied { map } for pid=31310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:57 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x10) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 1416.214057] audit: type=1400 audit(2000000396.322:27589): avc: denied { map } for pid=31305 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:39:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @rand_addr, 0x100000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) inotify_init() setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:39:58 executing program 3: 03:39:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x74000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:58 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000", 0x29}], 0x1}, 0x0) 03:39:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x10000000, {{0x1, '-'}}}, 0xe) 03:39:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x200300, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000280)={[], 0x0, 0x0, 0x1, 0xfffffffffffffff8, 0xe, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) write$vnet(r2, &(0x7f0000000200)={0x1, {&(0x7f0000000040)=""/78, 0x4e, &(0x7f0000000140)=""/161, 0x3, 0x6}}, 0x68) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x101502) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000001c0)={0x1, 0x5, 0x3, 0x0, &(0x7f00000002c0)=[{}, {}, {}, {}, {}]}) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="737939737cdd0011ca76b12aba34ceb0277031ccb4e48aee390cb0e9bc5677ce573566e1364b276fafbdb1b5c01bd1d7d319f1bdcacaf478ecd4334586e60a3a4d41fbbc37464fa7013e61e177c47ae849247f685754a7b3cd96556ead84d304ed052732aebaea1229fdf222e401bacace71dd239984afb800db0000000000000000000000000000000000000000"], 0x4) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x102, 0x0) 03:39:59 executing program 3: 03:39:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7a000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:39:59 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000000000", 0x2c}], 0x1}, 0x0) 03:39:59 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) get_robust_list(r0, &(0x7f0000000180)=&(0x7f0000000140)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000080)}, &(0x7f00000001c0)=0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:39:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x3f000000, {{0x1, '-'}}}, 0xe) 03:40:00 executing program 3: 03:40:00 executing program 1: io_setup(0x2, &(0x7f0000000000)=0x0) io_destroy(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x10000, 0x100000000, 0xffff, 0x100}}) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) socket$nl_route(0x10, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x4) 03:40:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000001140)=""/23) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mq_timedsend(r2, &(0x7f0000000140)="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", 0x1000, 0x7, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x3ff) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7f010000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:00 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000000000", 0x2c}], 0x1}, 0x0) 03:40:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x46030000, {{0x1, '-'}}}, 0xe) [ 1419.817131] kauditd_printk_skb: 156 callbacks suppressed [ 1419.817146] audit: type=1400 audit(2000000401.314:27749): avc: denied { map } for pid=31390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1420.015632] audit: type=1400 audit(2000000401.314:27750): avc: denied { map } for pid=31390 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:01 executing program 3: [ 1420.142946] audit: type=1400 audit(2000000401.314:27751): avc: denied { map } for pid=31384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1420.334739] audit: type=1400 audit(2000000401.314:27752): avc: denied { map } for pid=31384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0x80000000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='nlmon0\x00', 0x10) 03:40:01 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd00000000000000000000", 0x2c}], 0x1}, 0x0) [ 1420.507453] audit: type=1400 audit(2000000401.444:27753): avc: denied { map } for pid=31390 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffffb082b1f014d342430ad7968858c1857bc30d861fbdfb0d881729051a45b6e54d1ed21fe093c158584eb0bc3ff5a617bbc7ab9da27927c8a3e9ab0884e6a1529bd0bb17addece21e6faf1d732db5df7d2ad6a16f213867e8525892ffae2b90755bab0ea32e2561217d54c04783f5e9b8617060dfec46a834fce78fbe6d1"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000180)=0x100000001, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000002040)=[{&(0x7f0000000340)="800000001000010019000300e60100d4f1f4d4e6a84f710001000000000000000040000000400000800000e7ff0000006d5ebe5a0000ffff53ef14401316d455136485404728eaab0de5ed50187c5d772ec8b99a2c41e0c78e7c466f299aabfa6a", 0x61, 0x400}], 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000600)='/dev/vbi#\x00', 0x3, 0x2) prctl$PR_MCE_KILL_GET(0x22) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000680)={0xff, 0xd000}) bind$rose(r2, &(0x7f0000000640)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast}, 0x1c) connect$inet6(r0, &(0x7f00000006c0)={0xa, 0x0, 0x80, @empty}, 0x1c) r3 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000002c0)='ext2\x00', 0x0) r4 = add_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="158054ac43ca3eb2319acc655c05a960621abd1c52beb0b40b0f3f32f88969b6d6dfccdbf696db24648f50449c73353c29c94a3ddaa7dd7557292c64df073b0923d97cd93f368fbadc62e6ea16d9963867e37b3b73ee37825c12eca851c200c921dc4a8d8082964063f054f68ca858c11e411473fc4d6e9fb87aa0e658b629ec81baf9d8c816c6c6419691934286989fd1f89a277eae3d11acd377fb0c30a48f3d2468bf934cc0f40c198110", 0xac, 0xfffffffffffffffe) keyctl$search(0xa, r3, &(0x7f00000000c0)='\xb5\x18\x8d\x96\xa4\b\x91,\x01\xdeP\xadZRH\x19\x06', &(0x7f00000003c0)={'syz', 0x2}, r4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="c21c5d4b7846cf2d3c12fe89cea7ac7e58ac2bec0aeb4c65e7ecdc7a68e3a08f7547d4a89b0507f9c105d8105a70eba52e08812b257d25c342a8f132b4bfcd38a44d7f28e7caf9a07d96d624350d21a02cee6567d04cd4faa2ee2d90a26e58994e400c66f92f440b2b6ebe9d6e7bbfe721feb8fd87a71fa8527d099293ee94ede10af2ed67c053e6c7c926a145ca89a4305b7c0f51313e91312238ff7cb0a553b3bc3e6864b00b3986292fe2e07ecdbf02acfa3f4a3c9bd852d1"], 0xba) 03:40:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x80040000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x47030000, {{0x1, '-'}}}, 0xe) [ 1420.682057] audit: type=1400 audit(2000000401.444:27754): avc: denied { map } for pid=31390 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1420.874331] audit: type=1400 audit(2000000401.604:27755): avc: denied { map } for pid=31393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1421.001980] audit: type=1400 audit(2000000401.624:27756): avc: denied { map } for pid=31393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1421.148721] audit: type=1400 audit(2000000401.644:27757): avc: denied { map } for pid=31393 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:02 executing program 3: [ 1421.357753] audit: type=1400 audit(2000000401.664:27758): avc: denied { map } for pid=31393 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:03 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$bt_cmtp(0x1f, 0x3, 0x5) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x6b6b6b00, {{0x1, '-'}}}, 0xe) 03:40:03 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd0000000000000000000000", 0x2d}], 0x1}, 0x0) [ 1422.043884] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 03:40:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0xff030000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:04 executing program 3: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) 03:40:04 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x8, &(0x7f0000000000)=""/181) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8000, 0x0) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x820) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)={0x101, 0xffff, 0x4, 0x0, 0x0, [{r1, 0x0, 0x4}, {r1, 0x0, 0x1f}, {r1, 0x0, 0x1}, {r1, 0x0, 0x2}]}) sched_getscheduler(r0) ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000140)) 03:40:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x20400) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000140)={0x66}) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x2, 0x0, 0x3, 0x3, 0x0, 0x3, 0x200}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f8126fd5c6c221666"], 0x4) 03:40:04 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd0000000000000000000000", 0x2d}], 0x1}, 0x0) 03:40:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xe0000000, {{0x1, '-'}}}, 0xe) 03:40:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = memfd_create(&(0x7f0000000400)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x3) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000040), 0xfffb) fcntl$addseals(r2, 0x409, 0x8) shutdown(r1, 0x1) 03:40:05 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000080)={0x0, 0x200, 0x15af, 0x1a, &(0x7f0000000040)=""/26, 0x1000, &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001140)=""/4096}) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:05 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd0000000000000000000000", 0x2d}], 0x1}, 0x0) 03:40:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfc000000, {{0x1, '-'}}}, 0xe) 03:40:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000240)={r2, 0x80000, r1}) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f00000001c0)={0x3, "d89041a12caaff2df9b5652a710ef67740ae6a6d1343ee21f0beb0fcd56f738d", 0x2, 0x1}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000140)={'syz1'}, 0x4) [ 1424.854537] kauditd_printk_skb: 159 callbacks suppressed [ 1424.854552] audit: type=1400 audit(2000000406.357:27918): avc: denied { prog_run } for pid=31470 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:40:06 executing program 3: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140), 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x0, 0x80000000, 0xbe06}) clone(0x0, &(0x7f0000000040)="a5c62788568251887c0cbd9992b44a4a1729ee2c5e945a980120600ac01a86d67ccc6d347a90f484bfa147313a8ef70880533f8df06e48dfed4c255bd4cbcd88", 0x0, 0x0, 0xffffffffffffffff) [ 1425.030677] audit: type=1400 audit(2000000406.417:27919): avc: denied { map_create } for pid=31470 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:40:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1425.163300] audit: type=1400 audit(2000000406.517:27920): avc: denied { map_read map_write } for pid=31470 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:40:06 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) listen(r1, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1425.368656] audit: type=1400 audit(2000000406.867:27921): avc: denied { create } for pid=31478 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfe800000, {{0x1, '-'}}}, 0xe) 03:40:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x5, 0x1, &(0x7f0000000340)=[{&(0x7f0000000200)="0ca22ae47e46f69b1bc6c0bfd130b31794a60666d968c95a2ab3964bc143c33a893ee199f93080c4fc4541d0c768b986c55243ff45340deef6ae12eb0aba99d39728d6bfc854697434e281e64281fa2c7f9dc647ee2d1495f1624afaa946a9391966a92ccc431cbd7c4b3413c42fcc16a6b5bb0627983a5b2b402ae4ceb23ca90925c82d4a58dccd7f26", 0x8a, 0x2}], 0x10, 0x0) [ 1425.791330] audit: type=1400 audit(2000000407.287:27922): avc: denied { map } for pid=31487 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1425.905683] audit: type=1400 audit(2000000407.347:27923): avc: denied { map } for pid=31487 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1426.058087] audit: type=1400 audit(2000000407.347:27924): avc: denied { map } for pid=31487 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000bc0)='jffs2\x00', 0x400, &(0x7f0000000c00)='\x00') mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000740)) lstat(&(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000880)) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000002c0)) stat(&(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000180)='fuse\x00', 0x200000, &(0x7f0000000a40)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize'}}], [{@euid_lt={'euid<', r3}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'security.capability\x00'}}, {@fsname={'fsname', 0x3d, 'user_id'}}, {@fsmagic={'fsmagic', 0x3d, 0x401}}, {@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, 'rootmode'}}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) [ 1426.190670] audit: type=1400 audit(2000000407.347:27925): avc: denied { map } for pid=31487 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1426.377291] FAT-fs (loop2): bogus number of reserved sectors [ 1426.381502] audit: type=1400 audit(2000000407.487:27926): avc: denied { map } for pid=31487 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1426.424129] FAT-fs (loop2): Can't find a valid FAT filesystem 03:40:08 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x2, 0x20, 0x5b, 0xfffffffffffffffe, @time={0x77359400}, {0x40, 0x8}, {0x26, 0x2}, @note={0x9, 0xc3, 0x6, 0x100, 0xffffffffffffffb2}}, {0x8, 0x2, 0x40000, 0x7, @time={0x0, 0x1c9c380}, {0x0, 0x81}, {0x1, 0x5}, @quote={{0x6, 0x7ff}, 0x2, &(0x7f0000000080)={0x0, 0x6, 0x2, 0x80000000, @tick=0x2, {0x0, 0x8}, {0x6, 0x10000}, @raw8={"63363d5401c7f027f1558bcc"}}}}, {0x6, 0x1000, 0x5, 0x1f, @time={0x77359400}, {0xfffffffffffffff9, 0x6}, {0x8000, 0xadab}, @result={0x5, 0x8}}, {0xffffffff, 0x9, 0x2, 0xfffffffffffffff7, @tick=0xe1, {0x0, 0x7}, {0x4e, 0x6}, @time=@tick=0x5}, {0x9, 0x10000000000, 0x4, 0x9, @tick=0xe30f, {0xff, 0x1}, {0x0, 0x200}, @note={0xffffffffffff8001, 0xff, 0xa06, 0x8, 0x9aa}}, {0x1, 0x1, 0x1, 0xfffffffffffffff9, @tick=0x800, {0x6d, 0x4}, {0x9, 0x1ff}, @connect={{0x9a7, 0x2a26}, {0x101, 0x4}}}, {0xffffffff, 0x7fffffff, 0x9, 0x100, @tick=0x5, {0x2, 0x20}, {0x2, 0x401}, @note={0x5, 0xfffffffffffffc54, 0x9, 0x5, 0x800}}], 0x150) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffff, 0x400) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xaf) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1426.551389] audit: type=1400 audit(2000000407.577:27927): avc: denied { map } for pid=31487 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfec00000, {{0x1, '-'}}}, 0xe) 03:40:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x100000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:08 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:09 executing program 3: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) r2 = dup2(r0, r1) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x18, &(0x7f0000000280), 0xcc) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000040)=""/106) 03:40:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:09 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000080)={{0xffffffffffffff78, 0x7, 0x82f, 0x0, 0xff}, 0x5, 0xff, 0x3}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @multicast2}}, [0x3, 0x20, 0x68, 0x4, 0x6, 0x0, 0x1, 0xeb9b, 0x7, 0x4, 0x4, 0x4, 0x0, 0x1, 0x9]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x7, 0x8, 0x8, 0x8000, 0x11}, &(0x7f0000000340)=0x98) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1427.700462] FAULT_INJECTION: forcing a failure. [ 1427.700462] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.813703] CPU: 0 PID: 31522 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #44 [ 1427.821093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.830466] Call Trace: [ 1427.833086] dump_stack+0x1db/0x2d0 [ 1427.836758] ? dump_stack_print_info.cold+0x20/0x20 [ 1427.841821] ? check_preemption_disabled+0x48/0x290 [ 1427.846877] should_fail.cold+0xa/0x15 [ 1427.850799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1427.855925] ? security_compute_av+0x282/0xba0 [ 1427.860660] ? find_held_lock+0x35/0x120 [ 1427.864747] ? security_compute_av+0x282/0xba0 [ 1427.869373] ? find_held_lock+0x35/0x120 [ 1427.873461] ? avc_compute_av+0x2d1/0x800 [ 1427.877660] __should_failslab+0x121/0x190 [ 1427.882083] should_failslab+0x9/0x14 [ 1427.885918] kmem_cache_alloc+0x47/0x710 [ 1427.890067] ? trace_hardirqs_on+0xbd/0x310 [ 1427.894415] ? kasan_check_read+0x11/0x20 [ 1427.898728] ? avc_compute_av+0x2d1/0x800 [ 1427.902903] ? trace_hardirqs_off_caller+0x300/0x300 [ 1427.908032] ? do_raw_spin_trylock+0x270/0x270 [ 1427.912642] avc_alloc_node+0x2a/0x630 [ 1427.916566] avc_compute_av+0x2d9/0x800 [ 1427.920720] ? check_preemption_disabled+0x48/0x290 [ 1427.925769] ? avc_alloc_node+0x630/0x630 [ 1427.930046] ? rcu_softirq_qs+0x20/0x20 [ 1427.934041] ? __might_fault+0x12b/0x1e0 [ 1427.938136] ? lock_acquire+0x1db/0x570 [ 1427.942205] avc_has_perm+0x3c4/0x7e0 [ 1427.946034] ? lock_release+0xc40/0xc40 [ 1427.950029] ? __check_object_size+0xa3/0x790 [ 1427.954573] ? avc_has_perm_noaudit+0x630/0x630 [ 1427.959393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1427.965066] ? _copy_from_user+0xdd/0x150 [ 1427.969938] ? rw_copy_check_uvector+0x2a6/0x330 [ 1427.974745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1427.980318] sock_has_perm+0x2b3/0x3e0 [ 1427.984235] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 1427.989640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1427.995243] ? copy_msghdr_from_user+0x3bc/0x570 [ 1428.000043] selinux_socket_sendmsg+0x36/0x40 [ 1428.004569] security_socket_sendmsg+0x7d/0xc0 [ 1428.009214] sock_sendmsg+0x45/0x130 [ 1428.012962] ___sys_sendmsg+0x7ec/0x910 [ 1428.016986] ? copy_msghdr_from_user+0x570/0x570 [ 1428.021766] ? iterate_fd+0x4b0/0x4b0 [ 1428.025608] ? lock_downgrade+0x910/0x910 [ 1428.029785] ? __fget_light+0x2db/0x420 [ 1428.033810] ? fget_raw+0x20/0x20 [ 1428.037290] ? __mutex_unlock_slowpath+0x195/0x870 [ 1428.042250] ? wait_for_completion+0x810/0x810 [ 1428.046952] ? __fdget+0x1b/0x20 [ 1428.050347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1428.055908] ? sockfd_lookup_light+0xc2/0x160 [ 1428.060496] __sys_sendmsg+0x112/0x270 [ 1428.064416] ? __ia32_sys_shutdown+0x80/0x80 [ 1428.068872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.074265] ? trace_hardirqs_off_caller+0x300/0x300 [ 1428.079395] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1428.084205] __x64_sys_sendmsg+0x78/0xb0 [ 1428.088296] do_syscall_64+0x1a3/0x800 [ 1428.092221] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1428.097202] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1428.102257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.107136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.112377] RIP: 0033:0x458099 [ 1428.115604] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1428.134648] RSP: 002b:00007f22eeb38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1428.142384] RAX: ffffffffffffffda RBX: 00007f22eeb38c90 RCX: 0000000000458099 [ 1428.149683] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 1428.156975] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:40:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xff000000, {{0x1, '-'}}}, 0xe) [ 1428.164265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22eeb396d4 [ 1428.171559] R13: 00000000004c5614 R14: 00000000004d9348 R15: 0000000000000004 03:40:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x200000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x92000, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0xffff, 0x40000) r5 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x401, 0x0) r6 = syz_open_dev$cec(&(0x7f0000000740)='/dev/cec#\x00', 0x3, 0x2) io_submit(r1, 0x6, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x11b, r0, &(0x7f00000001c0)="836e2691fc174826ead17f388879862e03a691504d4e52b6cbd5a7fe29cd42b0e0741ffc0fd3d48726e95ebb7da3ea2692474baebed3419de93a8f7b67f88787c84239b266e47f43269d16903d4fd2c1a02fcc3eac3008157a6de831924c338b34e4480a3cc75f81f22f1af0dae2e01672c6dadd7374b7e8", 0x78, 0x81, 0x0, 0x3, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x4, r0, &(0x7f0000000240)="f451de84b67da7ca68dbb5f05bc6875c78fcf2280d0fdde37b0a7941", 0x1c, 0x10000, 0x0, 0x1, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x1, r0, &(0x7f0000000340)="e8a6eb1a36809384966f59a01e91cb7f31b45975e2889c2fbb8cebdf90b1ab728ae6d2d72201fa2a6e5bc016d8918af3bbc9cfa97528c9222c93073fbfdb90bb2c905b515ec7bb1c7cf22e1887d8169e59290577039410b8575318b9fdf776a831897f86591dcfe28b67f6d1ed29729dfe5fbd13391481576e307181a021151e22bed834c7cb650f37ee1da379af4d3a148909d67393a8347e7c65ef105b1486e9b3", 0xa2, 0x0, 0x0, 0x1, r4}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f0000000480)="73eff8d52464969e0c3fa79b94deba226b31f8934e4db7b3f6f359894cff48e2dc7d1cf41338914102388700d526a922a614cbf7e911660793cbf0728c873c0f48472162f98e58bcf770322bfbaa95a43a5cc75bb9", 0x55, 0x6, 0x0, 0x1, r5}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000580)="be202ecfc28149825b683e1aef6d287dbcbc8d86c88ca1dd1bd82dae819d7af0cd14c7aea7626614fc796843cdb04ff76e555b50049916a7e3fe0b93badfe8b69f", 0x41, 0x9, 0x0, 0x3, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0xf, 0x14, r0, &(0x7f0000000640)="45bdf42bf85d8fe48133778c5cc5ea7000403cd3f5ff87c73fc3b78b809815c29cbddfcf567b10ad697541e0a7d441e0602bf61ffe6fc28c6fc19b39def8d370c2c26f9be08c6d7cf527a87c34869acb5303a0677e975efe0f4939b1b1030193afd47e39358327ced8a3306127ccd8dfa059c097ac608ef283070da02c84d56b961ec653d227bd4b1840a5b40e0271c6e89ff78cf1e3cf244abcdba97ac48d14dc1b5f05b0da9c6705d9a903933ed0b7696d64b9dcfcc3b15ec7c89b4d870db87ce6", 0xc2, 0x340, 0x0, 0x1, r6}]) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000009c0)=@assoc_value={0x0, 0x200}, &(0x7f0000000a00)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000a80)={r7, 0x1c, &(0x7f0000000a40)=[@in6={0xa, 0x4e23, 0x1ff, @remote, 0x8}]}, &(0x7f0000000ac0)=0x10) 03:40:10 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:10 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af23, &(0x7f0000000000)={0x2}) 03:40:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x300000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1429.874814] kauditd_printk_skb: 117 callbacks suppressed [ 1429.874830] audit: type=1400 audit(2000000411.379:28045): avc: denied { map } for pid=31542 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.069637] audit: type=1400 audit(2000000411.489:28046): avc: denied { map } for pid=31542 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.218142] audit: type=1400 audit(2000000411.489:28047): avc: denied { map } for pid=31542 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.399532] audit: type=1400 audit(2000000411.639:28048): avc: denied { map } for pid=31542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.508754] audit: type=1400 audit(2000000411.639:28049): avc: denied { map } for pid=31542 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.599419] audit: type=1400 audit(2000000411.839:28050): avc: denied { map } for pid=31548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.699446] audit: type=1400 audit(2000000411.839:28051): avc: denied { map } for pid=31548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x400000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1430.772271] audit: type=1400 audit(2000000411.889:28052): avc: denied { map } for pid=31548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.839338] audit: type=1400 audit(2000000411.889:28053): avc: denied { map } for pid=31548 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1430.909296] audit: type=1400 audit(2000000411.989:28054): avc: denied { map } for pid=31548 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:12 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000001c0)="2d48df51376c2f96e592e5f5461ad868e43b7851a96bce69aef79120c872f1c83e071e15f277055e74f91de4ae1df03ec6d57649befdd4d9b8d1bd11357afa7b7554a42daa3815d766ca191023148204a26204b077262eb6a2612e0ca8ef4d51d369f55c28", 0x65, 0x40000, &(0x7f0000000080)={0xa, 0x4e22, 0x20, @loopback, 0x2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x500000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:13 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x2342) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0x7fff, 0xfffffffffffffffa, 0x100}) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:16 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) 03:40:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x600000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x2a}, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x4) 03:40:16 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$SIOCNRDECOBS(r1, 0x89e2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x6b6b6b00000000, {{0x1, '-'}}}, 0xe) 03:40:16 executing program 3: ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x27, 0x0, 0x22e) bpf$PROG_LOAD(0x5, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@dev, @in=@initdev}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000180)=0xe8) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x4}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x5}}, 0xe8) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) socket$inet6(0xa, 0x80803, 0xf741) [ 1435.042548] kauditd_printk_skb: 84 callbacks suppressed [ 1435.042565] audit: type=1400 audit(2000000416.552:28139): avc: denied { map } for pid=31582 comm="syz-executor5" path="/root/syz-executor5" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1435.207474] audit: type=1400 audit(2000000416.592:28140): avc: denied { map } for pid=31582 comm="syz-executor5" path="/root/syz-executor5" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 03:40:16 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x80800) setsockopt(r0, 0xffffffff, 0x400, &(0x7f0000001880)="aa9ad3324a9458b8a533a59272b077c4dad34ec749c97336efadb99e92c3136bf33e0e2d23b106af4f08ad0fcc99dd624ab10413931fe63adc7ceb3c4ba325462d733b54c8dbecc349faef079d109931993cdf054c47a94ef9d86b3c30a7399160ddad466a4e44", 0x67) r1 = socket$kcm(0x10, 0x3, 0x10) getsockopt(r1, 0x4, 0x1, &(0x7f0000000440)=""/4096, &(0x7f0000001440)=0x1000) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xd736, 0xc0000) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000001900)={0x1, 0x6f}, 0x2) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000100)=0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000015c0)={0x1, {{0x2, 0x4e20, @multicast1}}, 0x1, 0x4, [{{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}}, {{0x2, 0x4e20, @local}}]}, 0x290) accept4$packet(r2, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14, 0x80800) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001540)=ANY=[@ANYBLOB="4352a8f0", @ANYRES16=r3, @ANYBLOB="00082203c9f4635e208a132abd7000fedbdf25010000000000000008410100004c0018000000027564700002000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c066e85f4e61a6e2f6bd3d133f948e"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x8000) setsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000040), 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000003c0)={0x9, 0x2, 0xd86, 0x3, &(0x7f0000000340)=[{}, {}]}) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000001b00)={0xf000, &(0x7f0000001ac0), 0x1, r2, 0x4}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000019c0)={0x0, 0x7, 0x5, [0x3f, 0x9, 0x8, 0x1, 0x6]}, &(0x7f0000001a00)=0x12) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000001a40)={0x2, 0x1, 0x20, 0x80, r4}, &(0x7f0000001a80)=0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x8000, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001480)={0x0}, &(0x7f00000014c0)=0xc) syz_open_procfs(r5, &(0x7f0000001500)='attr/current\x00') 03:40:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff0132cddd348c9301282ff921ef529498bd9a1a9c2a44a835a4ed03670099032f13bf1207c69053b187b623f6ac74b27423b8da4e416861c54bf1050217c4423207dbcec6bdb078c578f68519112930a30f81d7ed5915755a0e2629af9c0ec4b8a8dddc16fc2eb3dd87143a6f77f68bdb8ec36cf900256a0090f363103d9bf4cd3b9e80e59c165c35f3a5676352d431770f4017aee7159d78e95f95582ec9c25713c5371e9ff943d729d905e58718fb5ee35854885d0821e51e"], 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8001, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000500)={0xd000, 0x10001, 0x3ff, 0x600000000, 0x800}) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)={'security\x00', 0xf1, "0c2f68699d7c3886bb994ddd9baee2c64399d4331450c940bc4a8d50466c8e6c6d3383d0086f599838aa89456711f85b2897142b5d6f56c013db04527309fd90dd49b6f51e8d147f6617ef2a23ab64734857cf57c6ae10b3f0e2cb5bf2c4b422c512fbe053351605e81ea312016c8c13bc3a5e199f0bf2c32b385ff2a3d3b212bd4a08dcae169fedc90d0b58443b0b21960461145c4cddf37639649ea940b57a6d5efbba864a0016c0fadd57ef9c5cfb8d8eec65ca82bde1b0cd77aeb5af8f4819434a8c787674293fa3bee7586601db2474fc79dd5e7605311fcf3fb14c0e11d9fee439f5484870a892f5d737d49eb421"}, &(0x7f0000000000)=0x115) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x800, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000001c0)=""/188) 03:40:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x700000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1435.344287] audit: type=1400 audit(2000000416.592:28141): avc: denied { create } for pid=31579 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1435.467960] audit: type=1400 audit(2000000416.602:28142): avc: denied { map_create } for pid=31580 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1435.606995] audit: type=1400 audit(2000000416.612:28143): avc: denied { map } for pid=31583 comm="syz-executor3" path="/root/syz-executor3" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1435.776842] audit: type=1400 audit(2000000416.612:28144): avc: denied { map } for pid=31583 comm="syz-executor3" path="/root/syz-executor3" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1435.926763] audit: type=1400 audit(2000000416.632:28145): avc: denied { write } for pid=31579 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1436.075411] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1436.075753] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1436.081443] audit: type=1400 audit(2000000416.632:28146): avc: denied { map_read map_write } for pid=31580 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:40:17 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) dup2(r0, r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x80, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x501000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x5, @empty, 0x717c}], 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200) ioctl$KDDISABIO(r2, 0x4b37) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f00000000c0)={@loopback, @multicast1}, &(0x7f0000000100)=0xc) 03:40:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x800000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:18 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='vmnet1%keyring\x00', 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='tls\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={r0, r1, r2}, &(0x7f0000000380)=""/31, 0x1f, &(0x7f00000004c0)={&(0x7f00000003c0)={'tgr160\x00'}, &(0x7f0000000400)="36b98f265bc346eb008ffb67008fe665012a89ec681082e7ef72a1e5bee0e527449d367e2466828e4c4e3d5770c10cf40c446b286013a9d29f773a8fa610e68ecb6115292cedf4204cfe1a90595ef6b59e0fd4797fc9cecf11038b0a7f9a64f79b16f4af3dc17fd39a7b4038fbcb4bb9a5fbc2aebfb4c8709ce20eb85060f85d63adcb9e224c55eb997d7d78fa63a484897ce5a1", 0x94}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r3, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:18 executing program 2: r0 = socket$kcm(0x10, 0x1, 0x10) socket$kcm(0x29, 0x7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8000, 0x0) r2 = accept4$x25(r1, &(0x7f0000000040), &(0x7f0000000200)=0x30, 0x80000) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000100)={0x7b, 0xa2a, 0xc, 0xb, 0xffffffffffff7fff}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x7ff, 0x0, 0x35a}, 0x0) dup(r2) 03:40:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1810000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x440100, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) [ 1437.980095] IPVS: ftp: loaded support on port[0] = 21 [ 1438.007161] IPVS: ftp: loaded support on port[0] = 21 [ 1438.007342] IPVS: ftp: loaded support on port[0] = 21 [ 1439.800811] device bridge_slave_1 left promiscuous mode [ 1439.812272] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.873115] device bridge_slave_0 left promiscuous mode [ 1439.878771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1444.346022] device hsr_slave_1 left promiscuous mode [ 1444.389112] device hsr_slave_0 left promiscuous mode [ 1444.451690] team0 (unregistering): Port device team_slave_1 removed [ 1444.469523] team0 (unregistering): Port device team_slave_0 removed [ 1444.485281] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1444.557711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1444.689004] bond0 (unregistering): Released all slaves [ 1444.850950] chnl_net:caif_netlink_parms(): no params data found [ 1444.895493] chnl_net:caif_netlink_parms(): no params data found [ 1445.024712] chnl_net:caif_netlink_parms(): no params data found [ 1445.211449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.218480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.243340] device bridge_slave_0 entered promiscuous mode [ 1445.277661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.290185] bridge0: port 2(bridge_slave_1) entered disabled state [ 1445.300431] device bridge_slave_1 entered promiscuous mode [ 1445.309701] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.321696] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.334640] device bridge_slave_0 entered promiscuous mode [ 1445.394949] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.401451] bridge0: port 2(bridge_slave_1) entered disabled state [ 1445.411798] device bridge_slave_1 entered promiscuous mode [ 1445.424423] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.430784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.443719] device bridge_slave_0 entered promiscuous mode [ 1445.453925] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1445.499069] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.527332] bridge0: port 2(bridge_slave_1) entered disabled state [ 1445.543299] device bridge_slave_1 entered promiscuous mode [ 1445.563955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1445.575913] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1445.618095] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1445.669673] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1445.682373] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1445.689892] team0: Port device team_slave_0 added [ 1445.709546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1445.727285] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1445.738609] team0: Port device team_slave_0 added [ 1445.744118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1445.751637] team0: Port device team_slave_1 added [ 1445.769846] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1445.782827] team0: Port device team_slave_1 added [ 1445.788290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1445.811147] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1445.820461] team0: Port device team_slave_0 added [ 1445.836100] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1445.851356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1445.870439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1445.881575] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1445.904007] team0: Port device team_slave_1 added [ 1445.959429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1446.035367] device hsr_slave_0 entered promiscuous mode [ 1446.082067] device hsr_slave_1 entered promiscuous mode [ 1446.142355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1446.152120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1446.205107] device hsr_slave_0 entered promiscuous mode [ 1446.272006] device hsr_slave_1 entered promiscuous mode [ 1446.341852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1446.348901] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1446.376277] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1446.445145] device hsr_slave_0 entered promiscuous mode [ 1446.481892] device hsr_slave_1 entered promiscuous mode [ 1446.531731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1446.557200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1446.657134] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1446.696904] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1446.745383] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1447.217044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1447.229995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1447.245574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1447.281507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1447.305849] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1447.322057] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1447.359624] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1447.387510] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1447.393864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1447.409106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1447.418842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1447.431919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1447.454293] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1447.481472] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1447.487549] 8021q: adding VLAN 0 to HW filter on device team0 [ 1447.499996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1447.516039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1447.537983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1447.556011] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1447.563843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1447.572665] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1447.578744] 8021q: adding VLAN 0 to HW filter on device team0 [ 1447.594467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1447.611612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1447.619279] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.625729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.677835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1447.689925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1447.706871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1447.718687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1447.726873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1447.734787] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.741210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.748566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1447.756797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1447.764643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.771109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.779869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1447.802770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1447.818748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1447.826051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1447.833503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1447.841705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1447.849381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.855795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.863251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1447.872687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1447.880227] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.886625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.893704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1447.902306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1447.911143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1447.920778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1447.932118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1447.940309] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.946701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.964938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1447.985342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1447.994148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1448.006090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1448.015664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1448.038878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1448.047608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1448.057093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1448.073036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1448.080232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1448.101377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1448.469261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1448.477433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1448.492648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1448.503908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1448.522748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1448.544740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1448.551717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1448.559645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1448.571206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1448.579449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1448.587677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1448.595546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1448.803435] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1448.816389] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1448.826337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1448.837964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1448.851266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1448.861079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1448.872309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1448.879956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1448.897203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1449.080722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1449.088138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1449.100703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1449.108256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1449.121187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1449.133968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1449.327145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1449.339573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1449.356945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1449.365678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1449.374831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1449.386560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1449.398041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1449.406516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1449.603999] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1449.614118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1449.634591] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1449.643260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1449.656977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1449.855894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1449.867665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1450.342593] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1450.358242] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1450.368014] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1450.601194] IPVS: stopping master sync thread 9125 ... [ 1450.613783] IPVS: stopping backup sync thread 9124 ... [ 1450.626391] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1450.648785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1450.669345] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1450.696950] kauditd_printk_skb: 165 callbacks suppressed [ 1450.696964] audit: type=1400 audit(2000000432.210:28278): avc: denied { map } for pid=31635 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1450.736172] audit: type=1400 audit(2000000432.210:28279): avc: denied { map } for pid=31635 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1450.810659] audit: type=1400 audit(2000000432.220:28280): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1450.889444] audit: type=1400 audit(2000000432.220:28281): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1450.999720] audit: type=1400 audit(2000000432.220:28282): avc: denied { map } for pid=31635 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.079142] audit: type=1400 audit(2000000432.250:28283): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.139399] audit: type=1400 audit(2000000432.250:28284): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.176792] audit: type=1400 audit(2000000432.250:28285): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.320618] audit: type=1400 audit(2000000432.300:28286): avc: denied { map } for pid=31635 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.438432] audit: type=1400 audit(2000000432.310:28287): avc: denied { map } for pid=31636 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1451.721394] device bridge_slave_1 left promiscuous mode [ 1451.726925] bridge0: port 2(bridge_slave_1) entered disabled state 03:40:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$cont(0x1f, r0, 0x0, 0x0) getpriority(0x0, r0) [ 1451.879783] device bridge_slave_0 left promiscuous mode [ 1451.885321] bridge0: port 1(bridge_slave_0) entered disabled state [ 1452.043225] device bridge_slave_1 left promiscuous mode [ 1452.058886] bridge0: port 2(bridge_slave_1) entered disabled state [ 1452.149738] device bridge_slave_0 left promiscuous mode [ 1452.155250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1457.572714] device hsr_slave_1 left promiscuous mode [ 1457.632836] device hsr_slave_0 left promiscuous mode [ 1457.692370] team0 (unregistering): Port device team_slave_1 removed [ 1457.707773] team0 (unregistering): Port device team_slave_0 removed [ 1457.725575] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1457.764244] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1457.861390] bond0 (unregistering): Released all slaves [ 1458.041119] device hsr_slave_1 left promiscuous mode [ 1458.102700] device hsr_slave_0 left promiscuous mode [ 1458.164654] team0 (unregistering): Port device team_slave_1 removed [ 1458.180136] team0 (unregistering): Port device team_slave_0 removed [ 1458.198145] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1458.241509] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1458.379594] bond0 (unregistering): Released all slaves [ 1458.982633] kauditd_printk_skb: 84 callbacks suppressed [ 1458.982649] audit: type=1400 audit(2000000440.494:28372): avc: denied { map } for pid=31655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.064608] audit: type=1400 audit(2000000440.494:28373): avc: denied { map } for pid=31655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.162295] audit: type=1400 audit(2000000440.514:28374): avc: denied { map } for pid=31655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.233355] audit: type=1400 audit(2000000440.514:28375): avc: denied { map } for pid=31655 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.295079] audit: type=1400 audit(2000000440.544:28376): avc: denied { map } for pid=31655 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.350645] audit: type=1400 audit(2000000440.564:28377): avc: denied { map } for pid=31656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.426549] audit: type=1400 audit(2000000440.564:28378): avc: denied { map } for pid=31656 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.521437] audit: type=1400 audit(2000000440.564:28379): avc: denied { map } for pid=31656 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1459.592909] audit: type=1400 audit(2000000440.574:28380): avc: denied { map } for pid=31655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:41 executing program 2: socket$kcm(0x10, 0x3, 0x10) 03:40:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x1902000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1459.622968] audit: type=1400 audit(2000000440.574:28381): avc: denied { map } for pid=31656 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x101f4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:41 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x5386, &(0x7f0000000200)) 03:40:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x400000000000000, {{0x1, '-'}}}, 0xe) 03:40:41 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="02d4b7fa6dc7c0fbbe7ee577269d0295ef50da099fac2fc0b493706fdcb8542efdb7527ae2d85c9c5f2cbd19dfdf3862bd347b9fd20e8b5ebbb6dc25e35002a6be2d0408ac8b23168b4f726b2615448762672f6a817bfcb83f127bc30d461a767af7f1f7a7b31322f7ca8494991eab25484363b6bc21bfe68bbc27122b39e5c66e3d321e33679712124627217aedcbfea35515bdbc13b391b6d6619032f683d1bb8662bfc12d", 0xa6, 0xfffffffffffffffe) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:41 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000240)=0x1, &(0x7f0000000280)=0x4) ioprio_get$uid(0x3, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x100000) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = socket$caif_seqpacket(0x25, 0x5, 0x4) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r4, 0x89ed, &(0x7f00000001c0)) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0xffffffffffffff72}], 0x1, 0x0, 0xe2}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0xfffffffffffffffc, 0x8dd2, 0x8000, 'queue0\x00', 0x7fff}) 03:40:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x3f00000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:41 executing program 5: clone(0x1101002102081ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000080)='/dev/sequencer\x00', &(0x7f0000000140)='/dev/sequencer\x00', &(0x7f0000000180)='/dev/sequencer\x00', &(0x7f00000001c0)='self@\x00', &(0x7f0000000200)='/dev/sequencer\x00', &(0x7f0000000240)='/dev/sequencer\x00'], &(0x7f0000000380)=[&(0x7f00000002c0)='/dev/sequencer\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='-vmnet1\x00']) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8002, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000003c0)={0x401, 'syz0\x00'}) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x500000000000000, {{0x1, '-'}}}, 0xe) 03:40:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) prctl$PR_CAPBSET_READ(0x17, 0x13) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1'}, 0x2) 03:40:42 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_procfs(r0, &(0x7f0000000140)='fdinfo\x00') ptrace$cont(0x1e, r0, 0x80000000, 0x0) 03:40:42 executing program 3: 03:40:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4000000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x800000000000000, {{0x1, '-'}}}, 0xe) 03:40:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x69b3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1}, 0x8) r2 = socket$kcm(0x10, 0x3, 0x10) pread64(r2, &(0x7f0000000240)=""/189, 0xbd, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x301102, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000140)=0x2) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7379009849884b36ab968781669d67bec13e40ccea5c3c623113ac2230482d9a39d053698eca22b912b92c0b0f10bd53"], 0x4) 03:40:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 03:40:44 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000200)={[], 0x0, 0x800, 0x4, 0x5, 0x400000, r0}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x3}, 0x4) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000180)={0x6, 0x8b}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1462.486272] Left network mode 03:40:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4703000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:44 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x1000000000000000, {{0x1, '-'}}}, 0xe) 03:40:44 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x7fff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x0, 0xbee, 0x8001, 0x4, 0x55}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000200)={r2, 0x3, 0xfff}, 0x8) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x11, 0x10, &(0x7f0000000240)="c951308031510ab293c85e5384198847"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r4 = geteuid() r5 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={r3, r4, r5}, 0xc) 03:40:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000080)=0x3ff) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000140)) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:45 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000380)) pipe(0x0) 03:40:45 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x46000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001380)=0x14, 0x800) sendto$packet(r1, &(0x7f0000001300)="00bd8f6759a260ddc0465f", 0xb, 0x8090, &(0x7f00000013c0)={0x11, 0x1f, r2}, 0x14) ptrace$cont(0x1f, r0, 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r4 = semget$private(0x0, 0x2, 0x204) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000300)=""/4096) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{}, {}, {}]}) 03:40:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4800000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:45 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x3f00000000000000, {{0x1, '-'}}}, 0xe) [ 1463.992524] kauditd_printk_skb: 137 callbacks suppressed [ 1463.992539] audit: type=1400 audit(2000000445.506:28519): avc: denied { create } for pid=31738 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1464.182592] audit: type=1400 audit(2000000445.556:28520): avc: denied { map } for pid=31739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1464.322568] audit: type=1400 audit(2000000445.586:28521): avc: denied { map } for pid=31733 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1464.555144] audit: type=1400 audit(2000000445.616:28522): avc: denied { map } for pid=31739 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1464.695154] audit: type=1400 audit(2000000445.626:28523): avc: denied { map } for pid=31749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1464.843456] audit: type=1400 audit(2000000445.626:28524): avc: denied { map } for pid=31749 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1464.989479] audit: type=1400 audit(2000000445.686:28525): avc: denied { map } for pid=31749 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/24, &(0x7f0000000100)=0x18) [ 1465.158128] audit: type=1400 audit(2000000445.686:28526): avc: denied { map } for pid=31749 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1465.225163] audit: type=1400 audit(2000000445.736:28527): avc: denied { map } for pid=31739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4603000000000000, {{0x1, '-'}}}, 0xe) [ 1465.353912] audit: type=1400 audit(2000000445.766:28528): avc: denied { map } for pid=31739 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x4c00000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:47 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4204, r0, 0xfffffffffffffffe, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:47 executing program 2: r0 = socket$kcm(0x10, 0x1, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:47 executing program 5: clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x60400, 0x80) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x100000000, 0x6, 0x3, 0x3, 0xbf3, 0x2, 0x3f, 0x7f5, 0xe0, 0x40, 0xc3, 0xffffffffffffd280, 0x0, 0x38, 0x1, 0x200, 0x8, 0x40}, [{0x7, 0x5, 0x9, 0x3d, 0x80000001, 0x4ee, 0x800, 0x4}, {0x60000000, 0x8, 0x400, 0x1, 0x2, 0x4, 0x8e6a, 0x7}], "aed5cb7af72350a0832c1d85157f9ca8284343535b67d46009515095a5901210302929cbaad29e7c4d85fc3215d5401397cd6165eaa25def4d2e3fa3356d15ad552147d24256df4be141310ce6a74aa6c9289e5f76d1143efee87b6ef84c9831d9f7d86bb760ab6e8e3eb9a687c37d8208e41fe3fd4a3eb0373517e2cd31ed78d1407de857f6cb324fe4d8807fa673af85f8d7537635fed84707d69161a6b23485f8c852191ea24a4d2cad15c5417c25f9fb9cdd93ae9c086610cb44000c02a8e6b44d9ea2c26c67463b2f626da3656f202e9f18c660dc760c88008e59f0338c6fd46130f0bf31ab41", [[]]}, 0x299) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:47 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x4, 0x1, 0xe49, 0x80000001, 0x19, 0xf6, 0x1ff, 0x7, 0x6, 0x8000008, 0x10002, 0x200}) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) signalfd4(r0, &(0x7f0000000000)={0x1}, 0x8, 0x800) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x4703000000000000, {{0x1, '-'}}}, 0xe) 03:40:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6800000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2) 03:40:49 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x104c2, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0xfffffffffffffffe, @local, 0x3}, 0x1c, &(0x7f0000000100)=[{&(0x7f00000001c0)="aa3f28906027abd4eed72c1abdb1f4de3f3ff9a2b46937a0a008ee7a953eac54aba56af65290e5fb1174944fb93bb8b1e2b0da9c976fce998939503d98fce4b6222f729fca76c0735399f1813a750658aa58e208a05d3b014226a003d181239db7c9825393af970e374c0e1e480c849fc078aaed0ced3ec549beca947d3f0b29e43ae1e4bff9471c42e27e73e3342deef63a26426685ada3f74707c97e97", 0x9e}, {&(0x7f0000000280)="3d45ce0e6b233668f5bc4a54a2d8fdd5a844a1315b545e1634a4c2f9d1475e000316f55c1e209f9f98c95ff6c834ea1973322f391d07611b10ee517ee1c0b06ddc004cec032f238ddbc45c03d57f4b58b184a05000da90f2256a29f8eca643fc08f88c65b3fd05c107521e2314dabb8cc6723c58902b16c849431bf5447bb253ea6d36c2cc87c5a6515aacad570895add71abd6ecb22f5c562a415800a466b44aa0f2d20b0f716e21e6f84595303fc20300af765070067f6223b21d57e37a69769aa009d0d8f5b81b116188dbadf5fcb66851b0e06b9d23cc50cf6a527cc14dddd", 0xe1}, {&(0x7f0000000380)="724af5f3db07ccd72bd73dbe2dbdf29a91195ee2c9445414394ee1cb0bd1f1078e9410eb4ad5243dd7833e0f578b61a1a5cfe623f5df4e629afac1f9026f4ca50f7f76163c907b3fafa977c5042c89aadd460328fa0bcfdf88f614297ab400128ffe4817e4f0277d3508040af6acaf2c0f043b663a3dc6a250f5cf8a13dd500d02b09cbd6bdebf3f174e581ecc3ddd3741fc3884e005b5e94309c4b51f3713f11670a49a3a83262adc23cbda45e86f2192d4cc0a5c31db010224dbe3057ccbc15504553717a71aa8fb1f44ce40513d988816822991", 0xd5}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="240d3d52f4fa7759ee4657e023b1fb9fefa349dbb92aa8f79c12cb4914f1cfa454b0e43eeb0772d6add15c48319689c8bb1ebeb5f37a01047c2917c4efa1a0583e14c5e9b01f689fa35227e632bbe2117d99e434d19e743e3d89cf64a767465af561fc017e0f021fcc248de35ce9e2e2b06f8e658ccfceb8442d6b3b0f2991fd8831593b60c75b094487f8aa792f49d2f8e9f788ce8923bf58f178aeb1bfaead2efe590b34c671eebb425c6c", 0xac}], 0x5}, 0x4) 03:40:49 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xe000000000000000, {{0x1, '-'}}}, 0xe) 03:40:49 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x0, 0x1, 0xfffffffffffffffe, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafef8e1b0daffffffffffff13cd69c42f3dd799c729229f767ec814055cbd17b69fed9e3fe3096b58d7e28c584606cc82d1c3d634282aa8711c11c807b9678e9f90c0243505bb3b0e288220f4d322011525fb624dd331c0a1d62144a5259361"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe8b, 0x10000) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000002c0)=""/158) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x6c00000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:49 executing program 3: mlockall(0x400000000007) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4) 03:40:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfc00000000000000, {{0x1, '-'}}}, 0xe) 03:40:50 executing program 2: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x8, 0x6, 0x4, 0x68e020, {r0, r1/1000+10000}, {0x5, 0x8, 0xfffffffffffffffe, 0x6be, 0x4, 0x9, "f0d74712"}, 0x400, 0x3, @fd=0xffffffffffffff9c, 0x4}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r4 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f00000001c0)={0x28, 0x0, 0x0, @host}, 0x10, 0x80000) r5 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x5, 0x400800) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000340)) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x40000, 0x0) ppoll(&(0x7f0000000240)=[{r2, 0x9000}, {r3, 0x8}, {r4, 0x10}, {r6}], 0x4, &(0x7f0000000280), &(0x7f00000002c0)={0x8000}, 0x8) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:50 executing program 5: clone(0x20020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x8, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x301000, 0x4) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)=0x2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1469.024853] kauditd_printk_skb: 126 callbacks suppressed [ 1469.024869] audit: type=1400 audit(2000000450.549:28655): avc: denied { map } for pid=31822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1469.170134] audit: type=1400 audit(2000000450.589:28656): avc: denied { map } for pid=31822 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1469.327169] audit: type=1400 audit(2000000450.599:28657): avc: denied { map } for pid=31820 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7400000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1469.500046] audit: type=1400 audit(2000000450.619:28658): avc: denied { map } for pid=31824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:51 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000180), 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000140)=0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="00001a9c54e71f3be48a2b"], 0xb) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000002c0)) munlockall() setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x132) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x2, 0x40, 0xff, 0x400, 0x0, 0x6, 0x0, 0x2, 0x6, 0x1, 0x800, 0x5, 0x0, 0x2, 0x80000000, 0x101, 0x5, 0x10000, 0x1, 0x8001, 0x0, 0x800, 0x6, 0xfff, 0x0, 0x9, 0x637d69cd, 0x0, 0x7, 0x2, 0x3, 0xb7, 0x1b, 0x8, 0x7, 0x2, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000000), 0xb}, 0x10, 0x5f, 0x200, 0x2, 0x5, 0x0, 0xffffffffffffffff}, r0, 0xd, r0, 0x8) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ed728e81"], 0x4) 03:40:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfe80000000000000, {{0x1, '-'}}}, 0xe) [ 1469.642595] audit: type=1400 audit(2000000450.619:28659): avc: denied { map } for pid=31824 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1469.873407] audit: type=1400 audit(2000000450.629:28660): avc: denied { map } for pid=31820 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.063473] audit: type=1400 audit(2000000450.679:28661): avc: denied { map } for pid=31820 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.234815] audit: type=1400 audit(2000000450.679:28662): avc: denied { map } for pid=31820 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1470.419490] audit: type=1400 audit(2000000450.689:28663): avc: denied { map } for pid=31822 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:52 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) r2 = accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@netrom, @rose, @bcast, @remote, @default, @netrom, @netrom, @default]}, &(0x7f0000000140)=0x48) r3 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x3, 0x0) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x2) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001300)='/dev/vsock\x00', 0x200, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000001380)='/dev/amidi#\x00', 0x2, 0x46002) r7 = syz_open_dev$dmmidi(&(0x7f00000014c0)='/dev/dmmidi#\x00', 0x7ff, 0x8000) r8 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001580)='/dev/vga_arbiter\x00', 0x200, 0x0) r10 = syz_open_dev$ndb(&(0x7f0000001600)='/dev/nbd#\x00', 0x0, 0x1) r11 = syz_open_dev$vbi(&(0x7f0000001700)='/dev/vbi#\x00', 0x0, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001780)={0xffffffffffffff9c}) r13 = syz_open_dev$radio(&(0x7f0000001840)='/dev/radio#\x00', 0x3, 0x2) socketpair(0x5, 0x0, 0x8, &(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = openat$null(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/null\x00', 0x103800, 0x0) r16 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer2\x00', 0x40, 0x0) r17 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001b40)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r18 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/qat_adf_ctl\x00', 0x86100, 0x0) io_submit(r1, 0x9, &(0x7f0000001d00)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x10001, r2, &(0x7f0000000180)="06f7bea17772a295bd57b8fde09fa5853a54c00fad2af82b0a963e301ad5f8f4b87f30b2aefa88bc5ba71136940794dc8b8093ca8ec4ccc1fc9aa29a1a358d30def2834d7ec2475d41973a589d486461e058d4f70a3488e78ae495f0b16d0e10bfe312182ffed88f6759abfaf345b8a317efea40743d5bd9b585345ebe65ab37a2ba1db1d7", 0x85, 0x0, 0x0, 0x2, r3}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x1, 0x101, r4, &(0x7f0000000300)="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", 0x1000, 0x4, 0x0, 0x0, r5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x6, 0x2, r6, &(0x7f00000013c0)="7e78914badc37878f49dc726c74347c26861d81b3043b80b3cdb68b42b91af83585eedd6e0b8976753ab49180099623fc613d20f07d57a09ee8862154daecca9c6d3f120d261144f7bd1762474060995a381c4fab9a0a478cc0a8e67b86a2bf18eb6756b07b11260ba6ad6334126d2cf682f3f5ccc96029a310346b8a60893ca36ff12bd2679e1ecacaba3d2b991521af68dad76af7d0a2e88cfbbd6db0c9defc87949f96707ae0996bb8bfa7255607b5af223b7490b01ed8abf0005afb609f14520d90132f89b145c7d90aca855458769c4948b109b26", 0xd7, 0x2939, 0x0, 0x2, r7}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x8001, r8, &(0x7f0000001540)="93bf972b26e4ef285751f2f5af6f0301800a87e4069543cbdeb6c80c169be366cac04a8f8539c0fd", 0x28, 0x200000000000, 0x0, 0x2, r9}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x8, 0x5, r10, &(0x7f0000001640)="da67d51167eafdb56a2fbb6fdf46f74b8681ea4792e2d594009b39719a6022fc635148f5d223b4beb58cfa1b75c8ea0745c551bee3ab464e7a2b95e056244736a203c756fd8fa53f00c01efb0fef05bdfd2331024fa75ddaa5763ad0271fb7bae8af7e1c2620c1b35998898f033e8cd0a03348dde7f7a76a7a76ef33e93a80f6ce834f3f2edec6afb79356788c5951363efa901d5ab81c9765ba144d4852adeb0a38e8abc60da829f12da93a", 0xac, 0x249, 0x0, 0x0, r11}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x4, r12, &(0x7f00000017c0)="706ad5163d35f0fbda7db820fb7425c41fd308b03df54ec797a3e262544ad8ba9c0810c47c69764eadf06f08a97a7a461564795d4354c7f28d7485f59818c97226d91d1f5a4d1e629e55385d61a3def93581de199cd3d3da2636ce72581e6fdc113d20cb", 0x64, 0x0, 0x0, 0x3, r13}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0xf, 0xffffffffffff4e52, r14, &(0x7f0000001900)="748be35e5ac1bed3a3530e4c30818604300da34532cd495d67956a8d6e62167c21cb80386197cb634ed723602d6aaec3ada00fc181f4acb4986729f7dc60433b478f2ed0d2a007bc348e4cf0b790324fd562f8da3eb82d655f2ed27dee642675ca439f987d631fdd844879cf31f7ca2a407858aa2ce8516bcbadc8d37a02e6a2887101cf35c2d72b416af0a395bd920a0e441c96ec98a2d198085a29cc475648fc15598b8adce3a729eee634ba3eb3e923e9e4be9621a0137500d5b4a378b79a4e47fbe3f9e37a844cdf3b427e", 0xcd, 0x547, 0x0, 0x0, r15}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0xf, 0x10000, r16, &(0x7f0000001ac0), 0x0, 0x1000, 0x0, 0x1}, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0xe48161d502db4d1e, 0x6, r17, &(0x7f0000001b80)="3ad2106b9b2f5def9c675688887e521b391feeb13ab13e293df44e5e305489667e954f8ddda8146e67f100b287df9ecf0be8c376aeb997ae26ae053c24a1cab345a4e547196c96f31416c128f67bbd78ab083d30b5d71c3b75e9028e1d7a4977164ab14056f2f6f994bcdb710ec40456f65811a93add9ae9e686792b905d2a306e5d72399dfdf9ece53650e19890be5c6d9744ee8042415412ff052369aa398d66db09e033bbe6c0e77eb113a9f1404e3d30aa502ed19d178c5da3b8abf59f84516d53632ae1ace8ff5dbcd82b", 0xcd, 0x1ff, 0x0, 0x2, r18}]) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:52 executing program 3: 03:40:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) sched_rr_get_interval(r1, &(0x7f0000000100)) [ 1470.559805] audit: type=1400 audit(2000000450.719:28664): avc: denied { map } for pid=31822 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7a00000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xfec0000000000000, {{0x1, '-'}}}, 0xe) 03:40:53 executing program 3: 03:40:53 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x1b}], 0x1}, 0x0) 03:40:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x7f01000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xff00000000000000, {{0x1, '-'}}}, 0xe) 03:40:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffff3283f63a0642d6d2bcd4ba6cb9ff7a6f87a40d415ab74049d89d2302760d471e4225b84a23d63d6218ad5e96faf3713dbb0e351683a6fd6392874199be2b335d5403a851dc2629f010e1abd416a4a06027982744ed62273efb8c7a00b4ccc4127c7d3a2f951bc16510a44b1e"], 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000001c0)={0x10000, 0x0, 0x4, 0x20000, {0x0, 0x2710}, {0x3, 0x8, 0x1ff, 0x7f06b5c8, 0x3, 0x7, "7a0fac40"}, 0x1, 0x4, @offset=0x8001, 0x4}) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x4, 0x1, 0x80000001, 0x4df, 0x7, 0xffffffff, 0x5}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0xd, &(0x7f0000000240)=0xd10, 0x0) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x100, 0x20000000000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:54 executing program 3: 03:40:54 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f00000000c0)=""/67) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0xffffffff00000000, {{0x1, '-'}}}, 0xe) 03:40:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x8004000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1474.131033] kauditd_printk_skb: 120 callbacks suppressed [ 1474.131049] audit: type=1400 audit(2000000455.661:28785): avc: denied { map } for pid=31890 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1474.318720] audit: type=1400 audit(2000000455.661:28786): avc: denied { map } for pid=31890 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:55 executing program 3: [ 1474.474792] audit: type=1400 audit(2000000455.791:28787): avc: denied { map } for pid=31895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1474.633858] audit: type=1400 audit(2000000455.791:28788): avc: denied { map } for pid=31895 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x214780, 0x20) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000080)=0x1c, 0x80000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:40:56 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x4) [ 1474.837368] audit: type=1400 audit(2000000455.811:28789): avc: denied { map } for pid=31895 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1474.995146] audit: type=1400 audit(2000000455.871:28790): avc: denied { map } for pid=31895 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0xff03000000000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1475.188559] audit: type=1400 audit(2000000455.901:28791): avc: denied { create } for pid=31897 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x2, '-'}}}, 0xe) [ 1475.380489] audit: type=1400 audit(2000000455.961:28792): avc: denied { write } for pid=31897 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:40:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) close(r0) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) write(r0, &(0x7f00000001c0)="40719238868611f50a5721b9fd419ccd6f386e1942311724bccc53b38efe0d35249019426f0cf246c2f1e32f596b41659a4cc41f9cb1e949452db0af49a44c31eb6b6d9e52169acda1c9890d40f33f4c3e591f5cba09ed31cc", 0x59) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1475.536922] audit: type=1400 audit(2000000455.971:28793): avc: denied { map } for pid=31895 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:57 executing program 3: [ 1475.696853] audit: type=1400 audit(2000000455.991:28794): avc: denied { map } for pid=31900 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:40:57 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20800, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, r1, 0x311, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc8}]}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6000000000000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 03:40:57 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000200)=0x2) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) getegid() r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000000c0)=""/129) 03:40:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0xffffffff00000000, 0x1000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:58 executing program 3: 03:40:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'osx.', 'tls\x00'}, &(0x7f00000001c0)=""/110, 0x6e) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0xc2605a894df75397) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:40:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x3, '-'}}}, 0xe) 03:40:58 executing program 5: r0 = gettid() ioprio_get$pid(0x3, r0) wait4(0x0, 0x0, 0x80000000, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000280)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x80500, 0x0) tkill(r0, 0x33) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200800, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)=r3) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffffc, 0x0, 0xe5, 0xfffffffffffffffe, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000200)={0x9, 0x8, 0xd1, 0x7, r4}, &(0x7f0000000240)=0x10) ptrace$setregs(0xf, r0, 0x9, &(0x7f0000000500)="dbe0aab90338b191dd0000986eda95af9e1aecb164abebc4b7ffdc29bf7ebb6e492060ef1ae64422e1873fb2f245c78784507d48f177e376f248bdadf0e364fca89195a156e443afa770836e6e0a3ba5a23ef5b9987b403b1f19dddf9c5427b92766e51f32c06ddde64bb11746ba613877b3a7218aaaae548011b9c2f6abd947d42811f3bad4ca058d461bf7c63e89e9a86afba289b0af89eac0af4e8725a98dec958a9f621b67b7cb9ce24f40513634ae4c73cab10566d3a79d672d68b54ed094837dfa7bc7d3442b1cf1f579b42d46788137db8e91c3b5") ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 03:40:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x20000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:40:59 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:40:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000480)={0x0, {{0x2, 0x0, @multicast2}}}, 0x5fa) 03:40:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x4, '-'}}}, 0xe) 03:40:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xffffffffffffffc8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000024}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0xd4, r2, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x31}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1e}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x47}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xe7}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe4e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff7fffffff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x880) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x1}, 0x8) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="73797a3127de810fdde27208858822fb016ed419b28f509ea02abdfa18e4d4e7639c3593af3d44df6464ce4359b17fc2c1ae8fb9f54ed23d4163294ce502c65adedcbc2734b184cab0e0f77c2870d56421d4a45a327bff07ba8b3e5cb60a549a10976a88c10aaab51c3c5fab53697175abc0313b1ee623b83ad3ca1e091c221962c3da540053"], 0x4) 03:40:59 executing program 5: clone(0x40004000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x0, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x2, 0xe0, 0x1, 0x1, 0xffffffffffffff08, 0x8}, 0xffff}, 0xa) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x23b, 0x280) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000140)={[], 0x4, 0x0, 0x7ff, 0x0, 0x1, 0x2000, 0x6004, [], 0x1ff}) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000300)={0xa, @output={0x1000, 0x1, {0x8d03, 0x6}, 0x0, 0x1}}) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000400)=0xc) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x3, 0x9) 03:41:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffea) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/avc/cache_stats\x00', 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000700)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r5, 0x501, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8}]}, 0x1c}}, 0x0) read$FUSE(r2, &(0x7f00000007c0), 0x1000) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$vnet(r1, &(0x7f0000000340)={0x1, {&(0x7f0000000280)=""/154, 0x9a, &(0x7f00000019c0)=""/4096, 0x3, 0x3}}, 0x68) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) r6 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5f0, 0x40000) write$UHID_INPUT(r6, &(0x7f00000001c0)={0x8, "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", 0x1000}, 0x1006) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:00 executing program 3: socket$packet(0x11, 0x0, 0x300) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="92", 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:41:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x7, '-'}}}, 0xe) [ 1479.135239] kauditd_printk_skb: 156 callbacks suppressed [ 1479.135255] audit: type=1400 audit(2000000460.604:28949): avc: denied { map } for pid=31971 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.347315] audit: type=1400 audit(2000000460.694:28952): avc: denied { map } for pid=31971 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1479.506107] audit: type=1400 audit(2000000460.714:28953): avc: denied { create } for pid=31975 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10d000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000140)=0x7) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0287cf2e8b798763eda563d6c150"], 0x4) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='selinuxfs\x00', 0x1200402, &(0x7f00000002c0)='\x00') [ 1479.686314] audit: type=1400 audit(2000000460.714:28954): avc: denied { write } for pid=31975 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1479.782069] IPVS: ftp: loaded support on port[0] = 21 [ 1479.879954] audit: type=1400 audit(2000000460.714:28955): avc: denied { read } for pid=31975 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1480.044679] audit: type=1400 audit(2000000460.754:28956): avc: denied { map } for pid=31974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000002}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1480.142811] encrypted_key: keyword 'new' not allowed when called from .update method 03:41:01 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) [ 1480.241476] audit: type=1400 audit(2000000460.754:28957): avc: denied { map } for pid=31974 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:01 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x3}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)) ppoll(&(0x7f0000000200)=[{r1}], 0x1, &(0x7f0000000240)={0x0, 0x989680}, 0x0, 0x0) 03:41:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x22) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1480.394581] audit: type=1400 audit(2000000460.794:28958): avc: denied { map } for pid=31979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1480.534479] audit: type=1400 audit(2000000460.794:28959): avc: denied { map } for pid=31979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x8, '-'}}}, 0xe) [ 1480.654006] audit: type=1400 audit(2000000460.814:28960): avc: denied { map } for pid=31971 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x103000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:41:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) open_by_handle_at(r1, &(0x7f0000000180)={0xf, 0x100000001, "cb095471e16699"}, 0x400) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0xa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:41:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000003}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:02 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1000000000000146}, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xffffffffffffffff, 0x400001) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 03:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="e2"]}]}, 0x1c}, 0x1, 0x300}, 0x0) 03:41:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0xf, '-'}}}, 0xe) 03:41:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="92", 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:41:04 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x8, 0x0, 0xfffffffffffffcd0}, 0x0) 03:41:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='eth0\x00', 0xfffffffffffffff9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) signalfd4(r1, &(0x7f0000000000)={0xd8}, 0x8, 0x80800) 03:41:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000004}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:04 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa8141ef2b025baaaaaa421d9531720601cc0dd8652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a312610b4cd781f814441ca9b6834ebf3ec586e2ea8d5a44f8809c43997c849440195a1b91f07309d51bf4ec7af294bbf0bf1bbfda1162cba749657070000000000000011ab50abe67b6b41f4e9fef998430d075db88150de6cd7a61f8bb07e00b42f255c79d380c753a484081b3ef6dc33c69008db4c09f7b79c984284603924cf8ff7858129e3ffe802b7df4409024d668a26a631d9"], 0x4) 03:41:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x16, '-'}}}, 0xe) 03:41:05 executing program 2: r0 = socket$kcm(0x10, 0x99566da33fd5c9a1, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000007c0)={0xced0, 0x1000, 0x5, 0x8, 0x4c8}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d95317206010dc2652b00140000fe8000000000aafefeffffffffffff16ffffd8f1b762f679830be5ddf6e96bb4fcf8feb81431e773077c71dbbe8bcf5683c423c7a8ceb29235b4cb7dba991e6d2513434c951ed9da6a6b6fb2a139a8ba7e3db19668"], 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000180), 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) sendmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000440)={&(0x7f00000003c0)=@canfd={{0x2, 0x8001, 0x400, 0xce}, 0x11, 0x2, 0x0, 0x0, "e6030c8c6211053c0f62b8022a049cbf4fad322ec146769345c05dcc3fdc1675b1ce25af1411d3c41b1eed9569c860152fa0ec298aa090e173363dd916c7abf4"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x40e0, 0x0, 0x0, 0x3, 0x6, 0x7, 0x4b, 0x40, 0x172, 0x100, 0x100000001, 0x38, 0x1, 0x400, 0x7, 0x9}, [{0x6474e551, 0x6, 0xffffffff, 0x4, 0xffffffff80000000, 0x4, 0x5, 0xfffffffffffffff8}], "1d16032f7de645063dca6cca1847b760cafb9ef3948fea836a0ad93ca8218c525267ca6030e71a217a053febc8bb0c780c58a5eacb5a89fbf37ee42d5b36623f59b1b72866f356ddc6688477bc0ff93999b55214b425b99a5636c5a2fee90b67bc9145a903d68ba2c2c6ba6b", [[]]}, 0x1e4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1'}, 0x4) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/mls\x00', 0x0, 0x0) epoll_pwait(r3, &(0x7f0000000500)=[{}, {}], 0x2, 0x80000000, &(0x7f0000000540)={0x858}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x40000) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000080)=@req={0x1, 0x3ff, 0x0, 0xffffffffffffff53}, 0x10) write$binfmt_misc(r1, &(0x7f0000000800)={'syz0', "e9198a7e339fd231fc849ee2817d5e34cf6f943691a9381a05e8b9a4f22b9d828f4b6abc2262487bef9141164fdbffd786ff8967a072c1"}, 0x3b) 03:41:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='eth0\x00', 0xfffffffffffffff9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) signalfd4(r1, &(0x7f0000000000)={0xd8}, 0x8, 0x80800) 03:41:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000005}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1484.073516] encrypted_key: keyword 'new' not allowed when called from .update method [ 1484.143016] kauditd_printk_skb: 134 callbacks suppressed [ 1484.143031] audit: type=1400 audit(2000000465.676:29095): avc: denied { map } for pid=32054 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1484.360618] audit: type=1400 audit(2000000465.786:29096): avc: denied { map } for pid=32054 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:06 executing program 5: r0 = socket(0x1e, 0x5, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) ppoll(&(0x7f0000000040)=[{r1, 0x9441}], 0x1, 0x0, 0x0, 0x0) connect$llc(r0, &(0x7f00000000c0)={0x1e, 0x302}, 0x10) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x70002, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1539) [ 1484.602383] audit: type=1400 audit(2000000465.806:29097): avc: denied { map } for pid=32054 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1484.812860] audit: type=1400 audit(2000000465.836:29098): avc: denied { map } for pid=32070 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:06 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x223, '-'}}}, 0xe) [ 1485.042254] audit: type=1400 audit(2000000465.866:29099): avc: denied { map } for pid=32070 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1485.207030] audit: type=1400 audit(2000000465.886:29100): avc: denied { map } for pid=32070 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:07 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl(r0, 0xb4, &(0x7f00000001c0)="f01a35d6cea443b92fdb2e7a3f33f6bd372586792d6cdbead02b27b0b753529eba79d41afcefc668e92b34d20cbef12d0ceb530dc9bb152ef9017cb13ae8cc50eb95353a3a44a4bad9381f3bfa9a9763f576a47301604b980fb5992c1c26b6441b4ff98b602da118e77dc52c2e24caf97707d4ab947ea5ef74108f8f7c7dd9e8b43fce13a5f39bfbe8ccea0e6894bbdb3d924b0441e4e436dd2ed046d8bf0ed53e08e26a88331e7b93e84dc6f2f8e1dad45f597bdb4495949c80d8f1c1d90c24882a37713067e673b3044c6442d10ab8fd68a8814ab8c98cf0b8a240ffbaa3bbe4fc") [ 1485.437418] audit: type=1400 audit(2000000465.936:29101): avc: denied { map } for pid=32070 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1485.634389] audit: type=1400 audit(2000000466.096:29102): avc: denied { map } for pid=32070 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000006}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1485.837093] audit: type=1400 audit(2000000466.237:29103): avc: denied { map } for pid=32070 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:07 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x8003, 0x26, 0x8}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB]) [ 1486.042029] audit: type=1400 audit(2000000466.237:29104): avc: denied { map } for pid=32070 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:07 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000001, 0x400001) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r1, 0x100, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}}, 0x8000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffec6a173cb97db88fda2a5c06000000000000009998874fa2d7ffffffffffaccd4cc203f0d4f72712c5fa4a"], 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000180), 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="a14aa8cacb9c7379339a7a31"], 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@remote, @in6=@local, 0x4e22, 0x3, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0xff, 0x0, r3}, {0x7, 0x9, 0x0, 0x20, 0x8, 0x6, 0x1, 0xfffffffffffffffd}, {0x101, 0x3f, 0x4, 0x3}, 0x40, 0x6e6bb1, 0x2, 0x1, 0x1}, {{@in=@remote, 0x4d6, 0x6c}, 0x2, @in=@local, 0x3503, 0x3, 0x2, 0x5, 0xfffffffffffffffb, 0x75, 0x9}}, 0xe8) 03:41:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x300, '-'}}}, 0xe) 03:41:08 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) close(r0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000096de0000000000000000000000000000000000000000000000000000000000200073792c3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000cc"], 0x119) write$binfmt_elf32(r2, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0xedd) write$P9_RREADLINK(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="14d29de1fee943dc6cd0e092d5bb"], 0xe) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) fsetxattr$security_capability(r2, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x800, 0x8}, {0x5bd, 0xdb5}]}, 0x14, 0x3) sendfile(r0, r1, &(0x7f0000000440)=0xffdffbfffffffff9, 0x8000fffffffe) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) fcntl$setown(r1, 0x8, r3) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000180)={0x5, [0xffff, 0xf36, 0x8, 0x43da, 0x4c848363]}, &(0x7f0000000340)=0xe) 03:41:08 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000007}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x600, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000001c0)={0x8, 0x2, [{0x9, 0x0, 0x10000000000}, {0x2, 0x0, 0x7ff}, {0x7ff, 0x0, 0x4}, {0x6, 0x0, 0x2}, {0x7ff}, {0x9, 0x0, 0x7fffffff}, {0x7e3, 0x0, 0x8}, {0x7, 0x0, 0x80000000}]}) 03:41:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x4, 0x401) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000100)=0x1e) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000180)={{0x3, 0x2, 0x7ff, 0x3, 0xbe5}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xb1, 0x0, 0xffffffffffff8000, 0xfffffffffffffff7}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x4}, 0x8) 03:41:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x7f01, '-'}}}, 0xe) 03:41:09 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x3, 0x0, 0x80000000, 0xad]}, &(0x7f0000000100)=0xc) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0xfbffffff, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="bc7c0a00001700af000000000000000015000000000000f377f280dfe8411ef365788dbec61ae26a4a3208b7a1a50b254b9cc41cec0f1db3f5962ce8b7a4ed0c09e585ca799dff3cd54636aa1efc1bd65ca2f5ab7a10ab32ba6ed4caa70100000000000000dc160c447bd0bb0b41e9e47c503e95980c1174e471ce4a456818a7935ed719ec7d176d4e607ffb62cdd8f8e1228ddf70c77b7f1ff0a1b2e37886b84f6fdc9bf94572afe4b48937290f5f65cb000000000200000000d2e51991ff19b41db4d9ca675a6af8f8000000"], 0x38}}, 0x0) 03:41:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000008}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1489.183761] kauditd_printk_skb: 132 callbacks suppressed [ 1489.183790] audit: type=1400 audit(2000000470.719:29237): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '\x7f'}}}, 0xe) 03:41:11 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0xfcdb) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r2}, 0x14) prctl$PR_SET_SECUREBITS(0x1c, 0x0) [ 1489.434489] audit: type=1400 audit(2000000470.779:29238): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000a8fefeffffffffffffffffffae723c2eae0f97fac62d0494a520aab620c73fdc28fa2cb3dba3ce6ec5798515404d64d0eb5dfa7e02b67b780aa3863b5210f1c2a238f3335490cf645489262c2ebebdddd42369f18e19c89091567afc1151e86613b3aa672ed130d7699560b7f41da24e917f4bf4ea507fb0db5ec1cb37d5dbdf2e16bb25bd205e8230be19779d9bc91129072b6b7923e210626359c73d0318b69cd3338d022a428447e9da2b7876a7460b3eff59502ed7b0264485923c22247f95ee02df4c910d2cf65f34fcbccb81beb275"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) connect$inet6(r0, &(0x7f0000000180), 0x1c) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x28a98bbe, 0xa000) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000001c0)=""/82) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) [ 1489.645385] audit: type=1400 audit(2000000470.819:29239): avc: denied { map } for pid=32135 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:11 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000180)={r2}) [ 1489.852797] audit: type=1400 audit(2000000470.869:29240): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000048}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1490.070135] audit: type=1400 audit(2000000470.909:29241): avc: denied { map } for pid=32132 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1490.210078] audit: type=1400 audit(2000000470.909:29242): avc: denied { map } for pid=32135 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1490.439454] audit: type=1400 audit(2000000470.959:29243): avc: denied { map } for pid=32135 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1490.612762] audit: type=1400 audit(2000000470.989:29244): avc: denied { create } for pid=32143 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1490.794440] audit: type=1400 audit(2000000471.069:29245): avc: denied { map } for pid=32135 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4}}, 0xe) [ 1490.969244] audit: type=1400 audit(2000000471.069:29246): avc: denied { map } for pid=32135 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d95317206010000c2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x4f9, 0x8, 0x8}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:41:12 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f00000000c0)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000000c0)) kexec_load(0x1, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0), 0x0, 0x6, 0x2}, {&(0x7f0000000100), 0x0, 0xfe18, 0xffffffffffffeaa0}, {&(0x7f00000001c0)="d84e8417bd57eb4fb9fa4fadc2eb895fb36dee88ede17f9ccdae40f11b52abea4fd4fd9d7d2067e204d9f51f1e2697bd151e89e04efa01b6c967ce175d901f863ea6277cb30047884ed9a0e93ed8ab5e3a3c28a14fb5d358cf8054ba7b39716fce6d21f56eec758f45e9362498733b18768645d66a0e262120b2454fde", 0x7d, 0x3f, 0x9}], 0x320003) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100004c}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:13 executing program 3: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x8000000000000000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) lsetxattr$security_smack_transmute(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000580)=0x800000000000002, 0x1b7) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080)=0x4, 0x4) sendto$inet(r1, &(0x7f0000000a00)="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", 0x241, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r2, &(0x7f0000000540)="4e4fff270d12b236d5b6b1e7f27a8c1de077fd5dec39bf7633a61477b6f6603c74b563c0d41c8388bdad035e604e6912a8fd830f9a7b94261ad2df", 0x3b, 0x0, &(0x7f00000000c0)={0x77359400}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x800, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r2, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) mq_timedreceive(r2, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000500)=0x9, 0x2) getcwd(&(0x7f0000000180)=""/118, 0xfffffffffffffcb6) unshare(0x0) sendto$inet(r1, &(0x7f0000000280), 0xcd, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @rand_addr=0x5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 03:41:13 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, &(0x7f0000000100)) 03:41:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x5}}, 0xe) 03:41:14 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) ioctl(r0, 0x9, &(0x7f0000000140)="304a07fbb8c83b1c39ed6444d420df2ccb84f9c7b16ede304dcc1afab23738568b6b91") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x25) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) 03:41:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000068}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:14 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, &(0x7f0000000000)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x4, 0x4bc5ec1a, 0x9}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000240)={r1, 0x3}, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8001}, {0xa, 0x4e21, 0x7, @loopback, 0x9}, 0x2, [0x3ff, 0x7, 0x1, 0x1, 0x1, 0x9, 0xd69, 0x1000]}, 0x5c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="4484e03c405a39e4db33797a31"], 0x4) 03:41:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@usrjquota_file='usrjquota=syz'}]}) 03:41:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x8}}, 0xe) 03:41:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100006c}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:15 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x3fa, @rand_addr="8ab6f6f85e3fa775ddfa5ffc6b973682", 0x2}, r2}}, 0x30) [ 1494.192104] kauditd_printk_skb: 149 callbacks suppressed [ 1494.192119] audit: type=1400 audit(2000000475.731:29396): avc: denied { map } for pid=32222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1494.391787] audit: type=1400 audit(2000000475.731:29397): avc: denied { map } for pid=32217 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = getpid() ptrace$peek(0x1, r1, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x801, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000240)={0x7, 0xfa, 0x3ff, 0x8000, 0x9, 0xffffffff80000001}) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f00000001c0)={0x1, 0x1, [{r3, 0x0, 0xfffff000, 0x1000000}]}) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a31939b93988f77a959a50d4d138dc9399db5561697b77f86ae2359a8d2d0ffb669d149a2f14e1d927d314a7c1686c4934b8709efa872190000"], 0x4) [ 1494.607380] audit: type=1400 audit(2000000475.761:29398): avc: denied { map } for pid=32222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1494.758044] audit: type=1400 audit(2000000475.781:29399): avc: denied { map } for pid=32210 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) accept$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0xb) recvmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000000240)=""/82, 0x52}], 0x3, &(0x7f0000002e40)=""/4096, 0x1000}, 0x40010000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000640)={&(0x7f0000000500)=[0x0], 0x0, 0x0, 0x0, 0x1}) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) renameat(0xffffffffffffffff, 0x0, r2, &(0x7f0000000440)='./bus\x00') getresgid(0x0, &(0x7f0000000140), 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) [ 1494.950317] audit: type=1400 audit(2000000475.801:29400): avc: denied { map } for pid=32222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1495.159658] audit: type=1400 audit(2000000475.801:29401): avc: denied { map } for pid=32222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x10}}, 0xe) [ 1495.269060] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1495.304666] audit: type=1400 audit(2000000475.821:29402): avc: denied { map } for pid=32217 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000074}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1495.517235] audit: type=1400 audit(2000000475.921:29403): avc: denied { map } for pid=32217 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1495.647059] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 1495.659979] audit: type=1400 audit(2000000475.921:29404): avc: denied { map } for pid=32217 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:17 executing program 5: bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @null}, 0x310) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r0, 0x694, 0x2}, &(0x7f0000000180)=0xc) r1 = memfd_create(&(0x7f00000001c0)='Q5PP', 0xe) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000002df7ed5e2b300000000"], 0xf) sendfile(0xffffffffffffffff, r1, &(0x7f0000000100), 0x7ff) r2 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xf179, 0x80) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r0, 0x1}, 0x8) [ 1495.803511] audit: type=1400 audit(2000000475.961:29405): avc: denied { map } for pid=32222 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:17 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x4, 0x80001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='vmnet0cgroupcpuset#cgroupem1ppp0!vmnet1-\x00') sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 03:41:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:41:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xe0}}, 0xe) 03:41:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100007a}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1497.038302] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 1497.164583] FAT-fs (loop3): Filesystem has been set read-only 03:41:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xa, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$getregs(0xe, r2, 0x0, &(0x7f0000000080)=""/18) 03:41:18 executing program 5: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x10000000000003, 0x101000) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000100)={0x2, @sliced}) 03:41:19 executing program 2: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000004c0)="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") r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 03:41:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfc}}, 0xe) 03:41:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2e52b00140000fe8000130000aafefeffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0xfcdc) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 03:41:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100017f}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:20 executing program 5: r0 = socket(0x8000000010, 0x80002, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="39000000130009006900000000000000ab00804803000000447f0107000000141800290073130000006455c4726e0000000400000306000000", 0x39}], 0x1) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x7, 0x9, 0x0, 0x1, 0x40, 0x68f, 0x5, 0x80000000, 0x3, 0x80000001, 0x40, 0x20, 0x8001, 0x7, 0x8, 0x23}}) 03:41:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x346}}, 0xe) 03:41:20 executing program 3: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000400)={0xc, 0x1f, 0x6, 0x10, 0x5, 0x3, 0x3, 0xa1, 0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x9, 0x4, 0x2}) close(r0) mount(&(0x7f00000002c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000300)='./file0/../file0/file0\x00', &(0x7f0000000340)='rootfs\x00', 0x1008, &(0x7f00000003c0)='.\x00') seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x20}, {0x6, 0x0, 0x80, 0xffffff7f7ffffffe}]}) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000000240)='.\x00', &(0x7f0000000180)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) pivot_root(&(0x7f0000000000)='./file0/../file0/file0\x00', 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000004c0)={0xcefa, 0x4}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000500)=0x2) lstat(&(0x7f0000000380)='./file0/../file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0/../file0/file0\x00', &(0x7f0000000200)='fuse\x00', 0x200008, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@pcr={'pcr', 0x3d, 0x7}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snapshot\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinuxvboxnet0'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) 03:41:20 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0)={0x77359400}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7ff, 0x40000) fadvise64(r1, 0x5a, 0x5, 0x5) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000000c0)='ifb0\x00') ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e22, @empty}}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000200)={'security\x00', 0x7, "b148eb40fe5a9c"}, &(0x7f0000000240)=0x2b) [ 1499.209022] kauditd_printk_skb: 134 callbacks suppressed [ 1499.209038] audit: type=1400 audit(2000000480.744:29540): avc: denied { map } for pid=32304 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9531720601cc0dc2652b00140000fe8000000000aafefeffffffd3a067a6ffff"], 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x69) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xfe33) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0xa, &(0x7f00000001c0)='mime_type\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=r2) r3 = dup(r0) accept4$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x80800) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000000)=0x9, &(0x7f0000000080)=0x4) [ 1499.434977] audit: type=1400 audit(2000000480.784:29541): avc: denied { map } for pid=32310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000219}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1499.624891] audit: type=1400 audit(2000000480.784:29542): avc: denied { map } for pid=32310 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1499.798409] audit: type=1400 audit(2000000480.784:29543): avc: denied { map } for pid=32298 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1499.869610] netlink: 'syz-executor5': attribute type 41 has an invalid length. [ 1499.961106] audit: type=1400 audit(2000000480.814:29544): avc: denied { map } for pid=32304 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1499.983011] netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. 03:41:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x347}}, 0xe) [ 1500.146335] audit: type=1400 audit(2000000480.844:29545): avc: denied { map } for pid=32304 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1500.154831] netlink: 'syz-executor5': attribute type 41 has an invalid length. [ 1500.315615] netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. [ 1500.346496] audit: type=1400 audit(2000000480.874:29546): avc: denied { map } for pid=32310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000200)=0x7d) recvmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r3 = dup2(r0, r1) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000040)={0x1, 0xfffffffffffffffe, 0x9, 0x0, 0x19, 0xca, 0x2, 0x8000, 0x20, 0x8, 0x9, 0xffffffff00000000}) syz_emit_ethernet(0x83, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff020000000000000000000000f10100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ef65feaa619566f65e7983b4f08c7627da52cf735a5d3562a52b1c2e4500a38e0e09b12"], 0x0) shutdown(r1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0c0583b, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, r4) [ 1500.556712] audit: type=1400 audit(2000000480.874:29547): avc: denied { map } for pid=32310 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1500.762920] audit: type=1400 audit(2000000480.894:29548): avc: denied { map } for pid=32304 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:22 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0xffffffffffff0000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000100)={{r2, r3/1000+30000}, {0x77359400}}, &(0x7f0000000140)) 03:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0xfffffffffffffffa, 0x80000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f0000000440)}, 0x10) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21001}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x606, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x42544e7e6a711c7a}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000180)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x14) get_thread_area(&(0x7f00000003c0)={0x3a, 0xffffffffffffffff, 0x2000, 0xe9a9, 0x7, 0x5, 0xfffffffffffffffe, 0x3, 0x5, 0x7ff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x7, 0x10000}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={r4, 0x2, 0xf00, 0x20, 0x8, 0x20, 0x7ff72025, 0x0, {r5, @in6={{0xa, 0x4e24, 0x0, @loopback, 0x7}}, 0x2, 0x7fffffff, 0xfffffffffffffc00, 0x8000, 0x5}}, &(0x7f0000000380)=0xb0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 1501.006020] audit: type=1400 audit(2000000480.954:29549): avc: denied { map_create } for pid=32311 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000300}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x500}}, 0xe) 03:41:23 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8910, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) r0 = socket$inet6(0xa, 0x3, 0x3a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_int(r0, 0x3a, 0x0, &(0x7f0000000040), 0x1d9) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x468, 0x0, 0x0, 0x108, 0x0, 0x108, 0x398, 0x398, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000080), {[{{@ipv6={@empty, @remote, [0x0, 0xffffff00, 0xff000000, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'veth0_to_team\x00', 'dummy0\x00', {}, {0xff}, 0x0, 0x6, 0x1, 0x10}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x6, 0x8, 0x1, 0x3ff, 0x527d1065, 0x36, 0xb849, 0x3]}}}, {{@ipv6={@mcast2, @dev={0xfe, 0x80, [], 0xd}, [0x0, 0xff0000ff, 0xff000000, 0xffffffff], [0xff, 0xffffffff, 0xffffff00, 0xffffffff], 'tunl0\x00', 'rose0\x00', {}, {0xff}, 0xff, 0xb6, 0x1, 0x1}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x5, 0x100000001}, {0x80, 0x3, 0x100000001}}}}, {{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x3fffffff800000, 0x7, 0x1, [0xd628, 0x101, 0x9, 0x101, 0x7f, 0x99, 0x3, 0xffffffff, 0x0, 0x2, 0x3, 0x3, 0x5, 0x100, 0x1, 0x80000000], 0xa}}, @common=@hbh={0x48, 'hbh\x00', 0x0, {0x8, 0x4, 0x1, [0x1, 0xffffffffffffffff, 0x9, 0x1, 0x0, 0x7f, 0x5, 0x1, 0xffffffff80000001, 0x1, 0x81, 0x2, 0x1, 0x800, 0x8e65, 0x100000001], 0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@empty, 'veth1_to_team\x00', 0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) 03:41:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="240000000d0607031dfffd946fa2830020200a0003000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000000c0)=0x1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:24 executing program 3: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000400)={0xc, 0x1f, 0x6, 0x10, 0x5, 0x3, 0x3, 0xa1, 0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x9, 0x4, 0x2}) close(r0) mount(&(0x7f00000002c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000300)='./file0/../file0/file0\x00', &(0x7f0000000340)='rootfs\x00', 0x1008, &(0x7f00000003c0)='.\x00') seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x20}, {0x6, 0x0, 0x80, 0xffffff7f7ffffffe}]}) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000000240)='.\x00', &(0x7f0000000180)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) pivot_root(&(0x7f0000000000)='./file0/../file0/file0\x00', 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000004c0)={0xcefa, 0x4}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000500)=0x2) lstat(&(0x7f0000000380)='./file0/../file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0/../file0/file0\x00', &(0x7f0000000200)='fuse\x00', 0x200008, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@pcr={'pcr', 0x3d, 0x7}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snapshot\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinuxvboxnet0'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) 03:41:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000347}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:24 executing program 5: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) r1 = socket$inet(0x15, 0x1, 0xfffffffffff7fffe) getsockname(r1, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000000c0)=0x80) 03:41:24 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x3f00}}, 0xe) 03:41:25 executing program 1: bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000040004}, 0x28) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x84000, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@ax25={{0x3, @default, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="e168201a46b0b3fc3fdbca8af912a75d7626172f25c02e21d259812f396d55392f31f217b64a9888e3ef5866759e701b", 0x30}, {&(0x7f0000000100)="10c3696db5ad7d0d77dd7ac9bbb0ae15994be6c927701e1799dbb8adfa35c6af0e41ad2a6db841f91bc035b9dcdb3cf5b4cf1984c3bd2aed1997706fa53824769e28295778e8c5775020dec66b75ad570b4de2eca6afd62de146d700a766402317230eb24f21b11f459e906a14a0dd92fc564ffbacdd9d1cb7554c2d9813ef8454a230b9eaa11b0b50163647a57fb91fc0b16f3fa1c851e9563a018cfc25887d91820d3723e3d8d5dba0f1d6cd5e9efd8323b8d9f121e1bdf89ec1392a76ade4035fb46eef007725453bc216", 0xcc}], 0x2}, 0x20040005) [ 1503.606972] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 03:41:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000480}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1503.899066] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 03:41:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x3c, 0x100000002, 0x9, 0x4}, 0xfffffffffffffdd3) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x80, 0x0, 0x10001, 0x80008001, 0x2, 0x800}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, r2}, 0x2c) 03:41:25 executing program 2: uselib(&(0x7f0000000040)='./file0\x00') r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1504.250285] kauditd_printk_skb: 175 callbacks suppressed [ 1504.250301] audit: type=1400 audit(2000000485.786:29719): avc: denied { map } for pid=32391 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4603}}, 0xe) [ 1504.452466] audit: type=1400 audit(2000000485.786:29720): avc: denied { map } for pid=32391 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1504.620515] audit: type=1400 audit(2000000485.926:29721): avc: denied { map } for pid=32391 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1504.822307] audit: type=1400 audit(2000000485.936:29722): avc: denied { map } for pid=32391 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1505.012431] audit: type=1400 audit(2000000486.056:29723): avc: denied { map } for pid=32399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:26 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) getpeername(r1, 0x0, &(0x7f0000000080)) [ 1505.192122] audit: type=1400 audit(2000000486.056:29724): avc: denied { map } for pid=32399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1505.432576] audit: type=1400 audit(2000000486.056:29725): avc: denied { map } for pid=32391 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:27 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000500}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:27 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x4, 0x4000000004, 0x100000000ffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) [ 1505.635163] audit: type=1400 audit(2000000486.056:29726): avc: denied { map } for pid=32399 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1505.766752] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1505.797251] audit: audit_backlog=65 > audit_backlog_limit=64 03:41:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4703}}, 0xe) 03:41:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x80) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000080)=0x6, 0x87) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0xfffffffffffffdf4) r2 = dup3(r0, r1, 0x80000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000540)={0x0, 0x0, 0x2080}) sendto$inet6(r1, &(0x7f0000000300)="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", 0x218, 0x8000, 0x0, 0x0) close(r1) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r2) 03:41:28 executing program 1: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x60003, 0x0) getdents64(r2, &(0x7f0000000240)=""/26, 0x1a) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x400200, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, 0x0}, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000100)={0x1, 0x0, 0x6, 0x6, 0x8000}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) splice(r1, &(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x8, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000540)=@req={0x28, &(0x7f0000000500)={'ifb0\x00', @ifru_data=&(0x7f00000004c0)="568727611bcb9351ab01e6736aa7df5dac3a175d01368d0863b6472aa532ce41"}}) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000280)=""/70, &(0x7f0000000480)=0x46) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x9, 0x3, 0x5}}, 0x14) getsockopt$inet6_int(r5, 0x29, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f00000005c0)={0x200, "8fcd8e2ef9bad2c331c2f8b43a2400ed3b4e23dda141fff9f6c8e711e5465031", 0xdcdc90d4bce5589e, 0x1}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)={0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:41:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000600}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:28 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000100)=0x8) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x31) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000180)={0xffffffffefd69f34, 0x5}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r2, 0x8}, &(0x7f0000000240)=0x8) shutdown(r1, 0x1) inotify_init() ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000000)={0xffffffff, 0x20, [0x2, 0x3a84, 0xa8, 0x2, 0x92, 0x400, 0x0, 0x7fff]}) inotify_add_watch(r0, &(0x7f0000000280)='./file1\x00', 0x82002000) dup2(r1, r0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 03:41:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x80fe}}, 0xe) 03:41:28 executing program 2: r0 = socket$kcm(0x10, 0x1, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000700}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045520, &(0x7f0000000980)={0x3}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8100, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20011540}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r2, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffc0}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x800) 03:41:30 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) splice(r0, &(0x7f0000000040), r0, &(0x7f00000000c0), 0x7fff, 0x2) 03:41:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xc0fe}}, 0xe) 03:41:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/dev\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000540)=""/124, 0x7c}, {&(0x7f00000002c0)=""/227, 0xe3}], 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) 03:41:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1001018}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1509.288575] kauditd_printk_skb: 187 callbacks suppressed [ 1509.288591] audit: type=1400 audit(2000000490.829:29907): avc: denied { map } for pid=32467 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1509.519947] audit: type=1400 audit(2000000490.829:29908): avc: denied { create } for pid=32469 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6, 0x0, 0x712000}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setlease(r1, 0x400, 0x3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000280)={0x0, 0x6}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x20400) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000340)) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000300), 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$PPPOEIOCSFWD(r5, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'sit0\x00'}}) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) [ 1509.742530] audit: type=1400 audit(2000000490.899:29909): avc: denied { map } for pid=32467 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)) accept$alg(r1, 0x0, 0x0) io_submit(r2, 0x0, 0x0) r3 = eventfd2(0x0, 0x0) getsockname$tipc(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x1, r3}]) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x48, r4, 0x31a, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x56e56057e0b132}, 0x84) [ 1509.984915] audit: type=1400 audit(2000000490.909:29910): avc: denied { write } for pid=32469 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1510.169258] audit: type=1400 audit(2000000490.939:29911): avc: denied { read } for pid=32469 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:31 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xe000}}, 0xe) [ 1510.440176] audit: type=1400 audit(2000000490.959:29912): avc: denied { map } for pid=32473 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1510.606703] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1510.642837] audit: type=1400 audit(2000000490.989:29913): avc: denied { map } for pid=32474 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1510.654884] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1510.692346] audit: audit_lost=107 audit_rate_limit=0 audit_backlog_limit=64 03:41:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1001810}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) 03:41:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000500)={'security\x00', 0x69, "9ab7f1bdae66c5e67ebda4d439d85110d2144a0f0c2a9d55ea675f560cf5e6a08147c1d680f71f00699b11e217d14db50bb5b6d751c0f78a535ce6df7c637a074ef4d0c10ca00cf4c8fedd9ac08e93c2dfc68f81013cbd2e627aea2ce9651e07081d9baa4069e9f901"}, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000900000003f30000000010000000"], 0x10}}, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) 03:41:33 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400002, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x0, {0x2, 0x0, 0x7}, 0x4, r2, r3, 0x3ff, 0x80, 0x0, 0x6, 0x9, 0x6, 0x6, 0x6, 0x2, 0x8, 0x3, 0x8a, 0x3, 0x2, 0x141}}, 0xa0) 03:41:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfc00}}, 0xe) 03:41:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1001902}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:33 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 03:41:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:/llb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) 03:41:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x300) socket$inet6(0xa, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x2000203a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setresuid(0x0, 0x0, 0x0) 03:41:34 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000300)) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0xfe74}]}, 0x2) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000, &(0x7f0000000180)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@privport='privport'}, {@msize={'msize', 0x3d, 0x1ff}}], [{@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@smackfshat={'smackfshat', 0x3d, '#'}}]}}) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x10) 03:41:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1003f00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfe80}}, 0xe) 03:41:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$KDGETLED(r0, 0x4b31, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041c7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d9"], 0x5d) getgid() chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 1513.706287] libceph: connect [d::]:6789 error -101 [ 1513.711397] libceph: mon0 [d::]:6789 connect error [ 1513.748642] libceph: connect [d::]:6789 error -101 [ 1513.773338] libceph: mon0 [d::]:6789 connect error 03:41:35 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:/llb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) [ 1514.290951] kauditd_printk_skb: 190 callbacks suppressed [ 1514.290978] audit: type=1400 audit(2000000495.841:30098): avc: denied { map_read map_write } for pid=32550 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1514.328531] audit: type=1400 audit(2000000495.851:30099): avc: denied { prog_load } for pid=32550 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1514.437635] audit: type=1400 audit(2000000495.881:30100): avc: denied { write } for pid=32548 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1004000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfec0}}, 0xe) [ 1514.587041] audit: type=1400 audit(2000000495.901:30101): avc: denied { map } for pid=32547 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000840)={0x8, "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", 0x1000}, 0xffffffffffffff09) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0402762426ddc6d532cd659b58064c4408732bd8e3a6898ab16b471d32c9c609fd1575e348f3ab95221feeb91328473307517c571c7cedc89aba20e1e825ac98f2d1c46fc19e5537dff8421af4a692097d8b51a853bff9af0ba1fda5"], 0x1, 0x0) setgroups(0x3db, &(0x7f0000000100)) sendfile(r1, r0, 0x0, 0x1) 03:41:36 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000002bc0)='/dev/amidi#\x00', 0x5, 0x10100) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x40, 0x2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r4 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000700)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) r9 = getgid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000840)=0x0) r11 = geteuid() r12 = getegid() r13 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000b80)=0xe8) fstat(r2, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f0000000c40)={0x0, 0x0}) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000d40)=[0xee00, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) r22 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000021c0)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000022c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002300)={0x0, 0x0, 0x0}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002380)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000023c0)={0x0, 0x0}, &(0x7f0000002400)=0xc) getgroups(0x5, &(0x7f0000002440)=[0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002900)=0x0) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a00)={0x0, 0x0, 0x0}, &(0x7f0000002a40)=0xc) r31 = gettid() stat(&(0x7f0000002a80)='./file0\x00', &(0x7f0000002ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r34 = getpgrp(0x0) lstat(&(0x7f00000064c0)='./file0\x00', &(0x7f0000006500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000006580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f0000006600)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006640)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000006740)=0xe8) getresgid(&(0x7f0000006780)=0x0, &(0x7f00000067c0), &(0x7f0000006800)) sendmmsg$unix(r1, &(0x7f0000006980)=[{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000240)="2f618f9113a4a6aedea4575ead4ffae1c8da7e50e46b89cdb56aeb90c47a321b80e761ccd4dd9e952b", 0x29}, {&(0x7f0000000280)="e9524adb249c7f121994126343177d461a575ac05b58bfe77cce94e191f0fc351ceb79acb51b3c8f5bea9936674f316a4ec4f1e0695f", 0x36}, {&(0x7f00000002c0)="005d9c1ac3b4049058f62f6acd19344a1feb535ddd91cbbe77f98832affcd2b0b93bc86bd5dd2d5c3b7ac885bbe0cb4eb9be8574c84c18d9e3bed8cc392cb722afb866179cb63b31b7ff3af42d517213842bf45611f79351f5a61971acfea5fd07e195707f05fb06d5b9576eb50b002be25e3210b0893f5701242892e470c3b8498be39c166f3dae3cecf26997d28a44ecf2f868745bab598a6b37719d1fd70375ed49dcb4b5cdf908f2f7b41be11c4700c2235fa2deef8f87cd2f0d508cfa8c2388759ffad293d709ddcdbf1bc744ef9b3bf0364d92b9b749f0eba13c8fc0ed2785508c1cdfc5a64ba01562db20", 0xee}, {&(0x7f00000003c0)="9df3e4c643e38a1fb21d873634d51ce0e449833fe1e15abb3d64f28825ffeecb191840d42c9ed70fc159449e8608fbc6481586904037b6d4bf21a56704db02db437a7db4b2cb4c6cfa721ca6adbfebde38fc625329533edfe2b2199bac9b62ac4b3fa38791b50fc3d604c280c82a3bbe42a9aa874450fddbfaca7b3b41d4c86afff72f50600bb3d7f3f46b34dc871b4a0a543b62c9a3f2553c1baba3e619c0e0959aa8d364c6c3041deabd119e40613e9bc4a9dec95a3f3b102e1a0598ae4b71769213d21bda70152324d39b190f9259f5f086a08f", 0xd5}], 0x4, &(0x7f0000000d80)=[@rights={0x30, 0x1, 0x1, [r0, r2, r2, r3, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0xf0, 0x80}, {&(0x7f0000000e80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002140)=[{&(0x7f0000000f00)="a110dfe680", 0x5}, {&(0x7f0000000f40)="c68f862282794efd85da5dee646e632c15c1e1bc6876e51ef90d359da2de0fbabc0490ff090d10751a70ec91ccd32428ec580eb434888ee41f762ab47700b40dcb8300133cc91b4d948702a8b0395996d814984496187d9791d8c1c15ee10d8d2285839ec622", 0x66}, {&(0x7f0000000fc0)="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", 0x1000}, {&(0x7f0000001fc0)="e09d857d93dcf9be7ad6b973f7c0a500471024f8b71567ff508ab33b852fb6bdd50f4b9cdd771efb559862a97f46015b5cf3b92935b5ecd6125009e221affc59ad76b1cceb780305605c9baa6afe9ac84c579c58b4bd79050fdb811cda149c3b0ae91cf8a03d84d4f9a8f83440e363f3bcdc3283249bde0d1cfde362a93782d734c8aadbc66140137a492c9c9f5851e466d5c9bb133f7f44ce5a2e89e5d401d191c737a4c3d00a84b43662ec07e634a7e32eaae8144ff79aad6506cfba9095fbd270c311965e31b46ce0f8f7de6ad515b0f047731bbf9aa7", 0xd8}, {&(0x7f00000020c0)="f7b340b80e646cb4b9cc1a1800b91e125a30772f9bb9ee98b71c19532ebe21d2a9c67fb1fce1ead4907cf2365583c632241451d8823eec9fc61208b8db950f55f035cb", 0x43}], 0x5, &(0x7f0000006ac0)=ANY=[@ANYBLOB="200000000000000001000000020000005fe5ace873ddb99118a1cfe0b7a059a50855b84c0216dd170400000000000000ed82c440abef9f930600000000000000e14d4f2808341faeba5247e678e5d69b29f5255568acac1060bf290c", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r27, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x84}, {&(0x7f0000002500)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000002580)="ffc9d49732dff296a86728289b86ba0a5465333e4882a0d874265b7f3efaecf2d239b4f32fffa875491c8f7becffa166f60a8d9074522c3a603ca3fe2f6ce5910ee441c08dc4675b6854691944351b0c45bff827721c386132f50adb1871081864a2284fbdffcf8d02dc6266715ecac83217b1db41f15f1b64b851647eb67340b9e4866711d6791ffb47f94d06dee99767c27e68e6430e64450d820ecee2fb4f1e120b800b08720401e827dfbb6a5657464292040a763e87dbc282a0140f36ef6f82122f0c670f149b24a7d5076f4987", 0xd0}, {&(0x7f0000002680)="b6615efb9f7cb492d9b2e0df581f3c982ffbd50e4bc5c9a5d5981325726da947418fb55c8e95410fc5d218f16e66b15c0cdb9c68add3c1ca0a6a0a849e2aac4085641e57f69b08c4c3d2058454d3a0bdcf97fc4019dd8402dc9c180f892ddd23d1ebcf3c2c4a42c587af2ce2055ab2e6bf1399ed0b477c3a8761d9a4676942adec9b5426a76fe29e96b6e38e6cf0ab94c2e2865bb7a5004f3865fe450aeaf5695ff380cfda12b613c5527945fe", 0xad}, {&(0x7f0000002740)="5bc3564156b5111d57343946093b8c544979a734abd46827f245e448bfad17b2c5db0103a90b03c8c5068123b35d837ec039d8238b04bb063939ece186f200312abb269091", 0x45}, {&(0x7f00000027c0)="5449db8ee8eb516de7bf885a46691febd9fa1bc0210ab9584d7c7366b37b12c3e8cae7ace8eaeabc708f4d992814f2478f28b7b9cf236611bb487c7eb6b7b5412a742e4af85cd43c1f8e1fe0f915e27e186269ad0fae5b8f0ba40adc91b3bb47ade285247adcdea4dcc87bc3b934ffe090d158c8e3c123d1fbb65b6928a3ad6b5d331c37376ead644d72d4969c844804235c03a9a3313ddae0cb8eeace0e970b391c70eee2d224eadc45835ecfde01808d3352f018439ee9985f9cf519f6a131ffc4f4e03b09fca6baadf090a29259104dc41aca54ee7d4de10de0029cff3d816b2760f0", 0xe4}], 0x4, &(0x7f0000006d00)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000060000000000000da67550001000000009b13fcc6a651fe2fcddad3c7b5c4eb9b6085", @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r30, @ANYBLOB="00ed0e002000000000000000010054000002000000cb440af05cf5e83dca8cb2e99e28ff2683edff4d204107ad979afabe5d0ed398418eb79c43f42637e5aaab9bc1517508ca7468c55fdefa60881b884dd739e4209a79424ed492c66306029356791f0d01923b65b377", @ANYRES32=r31, @ANYRES32=r32, @ANYRES32=r33, @ANYBLOB="0000764e46eaf6334f00080000"], 0x98, 0x8000}, {&(0x7f0000002c80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003f40)=[{&(0x7f0000002d00)="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", 0x1000}, {&(0x7f0000003d00)="91643d7597eec952cf23afb3d8e6098d1420968b8b7c74bbe1c5bf5848cc3595b18637835bcbdf51fb6436fa94cc53046d528d2aadf952a8f15f700b5ba826813be1860a3b01b17e9a3f570f8e6cd92d20be3c59d495258dc0a6b412aa28ef8c412ae012e44bdf9a650bde4d695f792d6fe68ae9939502b8e2b55202af7897c1ac287a9079c6cd17ba37dc64efff1837fc0bed446899cf472e5dab6b0e3228d67ea0e7406f799e1abbb24e9bce166abfa0c5044d7cccf671dde80d9743fff36cd4d8810f33e484c174931550fa50eae1dc142c3d", 0xd4}, {&(0x7f0000003e00)="184c610c7d30d3bd3a983cb69ceabb979eec63b0b95009dbd190f5be7118f2247dbffd132b75afdded9b69de2b934db7ae550e419554551ffa9256c252f761615b7d2c7ac4f5fd498a5184e11369ab2b2592683ef383e6a53366d5ee3d5615987318db8c44d7911c780d7da73efa45673b5787a18c8a904d1d18c4d24849042d857a04a3c35386a2", 0x88}, {&(0x7f0000003ec0)="27c9043e60497fc3eee31eab637c8bd8cb558667666bcaf630a8489092490f6c72a6e670e8d121799b4de8bf1145e3fc6cb7e2b9f8ffb8138c", 0x39}, {&(0x7f0000003f00)="2dbf0629966d37bf7939823ae8fbd95a485eebbc4208101374986fbc2bf110451f051b3b03c5e1c147735749fc50c0c5e9b8", 0x32}], 0x5, 0x0, 0x0, 0x40}, {&(0x7f0000003fc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000006440)=[{&(0x7f0000004040)="c157b7c26e9490eab9190d41bd79b206bb69b5ec8acca728442fd9abc58bff0fb4a223304301175afaf7514b4efafe9f51277ccbc05c86b77a08a42df9013155f79943998ea6bb04bacc143e64569be5448ac8800b68e818cceda0754114dd4f8012b4cbc1ab711fc60b3223559091d52fe9b545ece54baf88f910b0979c65de82553a69361357fca92ab77ca95d14b7ee1fc5b24678fa420e3f1c37b053401402c35b262066b962cf01f1c4759c95009c9d96209f3819da309284f7f50e414c266907a8b89437923f10221a5ec6604e7d42826a03", 0xd5}, {&(0x7f0000004140)="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", 0x1000}, {&(0x7f0000005140)="4af32c5b420ff8c6b2395a81c6cccb531c84c6ce517e0ee22ba6d0f9e685dccbbdf204a502aed9e816f1b75a629eedef61c8a16644f3ae5c2290aa136e1be9a90fbe64f17ae75c4e0b91c9ab123b42999a139f38acf2178d8b82b1a04e536e839a43c86b6b739eaba206e15a0d00c54ba7621103e68f667012ca3e4afdf94e6323f028d846a29412610a77f1f12208dc583e58f412fed3935c7ba2ffd267bf52c8674bf8edbcbb78556b3c3531a74df77bd2838f1ae932da95", 0xb9}, {&(0x7f0000005200)="616c387cd189ea3980fa8e5f731d1c", 0xf}, {&(0x7f0000005240)="d0d3214badd8de8e9d9b4e9043a5d3ef6cd9c7ba3a890122e3a71e7e375bffe11047a7a35dbc12e9770ee0beef26f3b665b9e63054b6ad9bacca3a50cb32cb0e889b120b6aca349c306adb1fbf5ba4587b64", 0x52}, {&(0x7f00000052c0)="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", 0x1000}, {&(0x7f00000062c0)="b338e89d84ba15e5728ece121b618a65005e5e473ae93910a1532ff90a5d7e88141d3102bf671860fbf55c6d748602ccc6aeffc3ec069626256e8963d2c9fd3257e8fe1fe811cb9580ad256b0eb091b6f26e39c04978744854f9c80d8587141cee87d4256b4caddd6bec6e2d888c033a5e23c974e5bc0619ab6dd55b14727913e2b3e8fe370c2212f0be043288e9de2a8b5a8ed6312aba79973ce2a9", 0x9c}, {&(0x7f0000006380)="1479accaf8a64e3a70f312768c814cb30e73b20b92270558e784001c40c2ca2c42dbf91b2d9ea8e4ec5bbca2608e1e46fd10bf16a87518fcba51e70fb520ab5e2e18d58d99867a005a8085929b730c33e5f5fade6dc6ed006fb11213b486c55939159eed030d64bd91268bc6528a0d3a744bbec257b6793a8301c7d42aa0f3cbef18c35bd37dfae37d068786390cd929739293b3485d460eb7b1f95dcc9b20080b2726cbdb5839a155436de9c248374e7ad4df57007315a35c7e", 0xba}], 0x8, &(0x7f0000006840)=[@rights={0x28, 0x1, 0x1, [r1, r0, r1, r2, r2]}, @rights={0x38, 0x1, 0x1, [r1, r2, r1, r2, r2, r2, r1, r1, r2]}, @rights={0x20, 0x1, 0x1, [r2, r0, r0]}, @cred={0x20, 0x1, 0x2, r34, r35, r36}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}], 0x128, 0x40}], 0x5, 0x40c0) [ 1514.837818] audit: type=1400 audit(2000000495.911:30102): avc: denied { map } for pid=32547 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1514.991968] audit: type=1400 audit(2000000495.921:30103): avc: denied { getopt } for pid=32548 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1515.169833] audit: type=1400 audit(2000000495.921:30104): avc: denied { map_create } for pid=32550 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1515.310792] audit: type=1400 audit(2000000495.941:30105): avc: denied { map_read map_write } for pid=32550 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1515.567849] audit: type=1400 audit(2000000495.991:30106): avc: denied { map } for pid=32547 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x3, 0x2) 03:41:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1004703}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1515.992286] libceph: connect [d::]:6789 error -101 [ 1515.997800] libceph: mon0 [d::]:6789 connect error 03:41:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xff00}}, 0xe) [ 1516.057923] audit: type=1400 audit(2000000495.991:30107): avc: denied { map } for pid=32547 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1516.078762] libceph: connect [d::]:6789 error -101 [ 1516.159645] libceph: mon0 [d::]:6789 connect error 03:41:37 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 03:41:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="3d4eeaa557f6f0"], 0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, 0x0, 0xfffffefb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:41:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x803, 0x3) socket$inet6_sctp(0xa, 0x5, 0x84) inotify_init1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) dup3(r0, r1, 0x0) 03:41:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1004800}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f00000000c0), 0xc) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1f, 0x440000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000040)={0x3}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140), &(0x7f0000000280)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) inotify_init1(0x0) write(r3, &(0x7f0000000340), 0x0) dup3(r0, r1, 0x0) 03:41:39 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f00000002c0)=0xffff) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x0) sendto$netrom(r2, &(0x7f00000001c0)="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", 0xfe, 0x10, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}, 0x48) 03:41:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r4, 0x0) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) 03:41:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x6b6b6b}}, 0xe) 03:41:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000040)="66b90200004066b840518b0066ba7f3fb41a0f302e660f7c260f00f30f5cffba2100b009ee3e672e0fc75dee0f01900d0066b9be09000066b80040000066ba000000000f30dceb66b9800000c00f326635001000000f306766c7442400008000006766c7442402fc0000006766c744240600000000670f011c24", 0x7a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1518.748998] hugetlbfs: syz-executor3 (32627): Using mlock ulimits for SHM_HUGETLB is deprecated 03:41:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1004c00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4000000}}, 0xe) 03:41:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x200000001, 0x1, 0x8, 0x4, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000010c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x10) 03:41:40 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x30) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x100000001, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0x7}, 0x3a5) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x13, r0, 0x0) getresgid(&(0x7f00000028c0), &(0x7f0000002900)=0x0, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000002b40)=0xe8) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x400, 0xa, &(0x7f00000027c0)=[{&(0x7f0000000240)="7aeede4d6ecdda618a272c126fe07e973037ced538d74706ef7c0f0c1c6a38ed642647b1aba283f6f9c23e15f6b160ef9d56987e92f418e9e2438ab757027571ba279beda3207b5edba018bd21174eba0c1dde3a4527535bcc3c62c4ab616fa68c7709f03801cab582a9e6cc3ccb1dcb153291d77ed9816256135152064d6a3f33bd8928917a30bb96950d47b7f96292b85135dabbc4163d7a6ff7297a98361aee7e41f7fcb4cd693243edefd7cdfebc1a6f5947160cd85e6ab8f5d33da44ca5746cb4a8e503b1df267f04fce71d93e980f6d747411946a5aa8739fdfd10479da33f3003f888b49fe8d23768ef", 0xed, 0xfffffffffffffff8}, {&(0x7f0000000340)="acd680ba1e79420d9e818b58ec101ee11e21512c0c962d01158274b61f2d4ac482edcbce1855d59f9a16afae5ad024d6ec05d6dad93759c044c4ae4f4e44c12c2e68c1e1b349028725505ff0f15c0ea8dc7bd9fdfd704870507066", 0x5b, 0x9}, {&(0x7f00000003c0)="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", 0x1000, 0x4}, {&(0x7f00000013c0)="5fe5b87681ff48bc81a42b1795b2e9169c", 0x11, 0x800}, {&(0x7f0000001400)="3c0d8d1e59022aa56da81d0014e8f99c11cbd565ac2f1f4d7e70f6f0b1ccb8210e859e4ef2adf8296c99eb17380a6d4e4eb96a644541b51a492d962f62accd8ecfcebcdaf10bd557292a065aab6389b8694a132eef9fbfd60ddc59b172c8ebcd4f1b4075c1e1c800c22c7f7fdd8b8b27c28146b6a1e01792498c7fe71d14a8263b574e2373", 0x85, 0xfffffffffffff801}, {&(0x7f00000014c0)="681b9414ec061ef880a183cabb86e83dc507633e773af054cc8a07fade3f464db558710cc8e78ece8fb840c0e58bd24e91aec14b92019c84edfcc0ae050c771a087622ea0c710333067ab64a24601332198e045c4edb10e234e4a5a840434aa02be69eef689bb3db3e4e8f597d487efcb8eb1ee88c41f58ea7c76f55ec17adcaedc33eb2aaa9eb6e503fc91504491903b59f769bb936b2c33aa6e6840a87082649a623e2d3aaf9b568dc67536cb4c783238d7e9feb2c4c086bd3168ffa5362e83e634b2fa714a03d6b1d896c445c87006ce09e92cd", 0xd5, 0x8001}, {&(0x7f00000015c0)="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", 0xfd, 0x5d}, {&(0x7f00000016c0)="3ffca1", 0x3, 0x9}, {&(0x7f0000001700)="b5bbdfcdd0815016c5bdb2da3ab8c8515e1aef1793952bf26b22d2976b5a4b30184e1432eddc394b31ac0d3d303da6a0dbe052ee7ddb07de442e20a6039d8a0fb31c21e64708e2c35ea48c7fdf4c8d1632cd95b050695262e83b1c1f2d9c12e1e07219a31dead46fe980a3e7874ccc57f81fa5cb117da7590d89ad4b3c381cf914083682daca365f4e45f20835378f69dff8ebe90d443f7fb52dd3a1830e8151b753af181fb76e", 0xa7, 0x54da}, {&(0x7f00000017c0)="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", 0x1000, 0x7}], 0x201800, &(0x7f0000002b80)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB="2c736d61636b66736861743d2a6b657972696e67657468312573797374656d2473656c66776c616e3076626f786e6574315c2c736d61636b66736861743d2efe295d707070316d696d655f747970652b6d643573756d402373797374656d707070312c636f6e746578743d73797361646d5f752c6f626a5f726f6c653d2b262c61756469742c657569643d", @ANYRESDEC=r4, @ANYBLOB=',func=CREDS_CHECK,subj_type=,\x00']) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x1ff, 0x4, 0x6}) umount2(&(0x7f0000000000)='./file0/file0\x00', 0x2) 03:41:40 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) sysfs$3(0x3) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 1519.548241] kauditd_printk_skb: 149 callbacks suppressed [ 1519.548256] audit: type=1400 audit(2000000501.094:30257): avc: denied { map } for pid=32642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1519.715989] audit: type=1400 audit(2000000501.134:30258): avc: denied { map } for pid=32642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1519.868114] audit: type=1400 audit(2000000501.134:30259): avc: denied { map } for pid=32642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1520.079280] audit: type=1400 audit(2000000501.134:30260): avc: denied { map } for pid=32642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 1520.272447] audit: type=1400 audit(2000000501.244:30261): avc: denied { map } for pid=32643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1006800}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:41 executing program 5: clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() socketpair$unix(0x1, 0x4004000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setownex(r2, 0xf, &(0x7f0000704000)={0x2, r1}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) wait4(r3, 0x0, 0x60000002, 0x0) [ 1520.432661] audit: type=1400 audit(2000000501.254:30262): avc: denied { map } for pid=32642 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1520.598981] audit: type=1400 audit(2000000501.324:30263): avc: denied { map } for pid=32643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x5000000}}, 0xe) [ 1520.804372] audit: type=1400 audit(2000000501.354:30264): avc: denied { map } for pid=32643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1520.985027] audit: type=1400 audit(2000000501.374:30265): avc: denied { map } for pid=32643 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:42 executing program 2: r0 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='fdno=\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',posixacl,cache=none,afid=0x0000000000000009,fscache,obj_user=/dev/cec#\x00,smackfstransmute=/dev/cec#\x00,\x00']) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1521.234082] audit: type=1400 audit(2000000501.374:30266): avc: denied { map } for pid=32642 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1006c00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') write$P9_RREADDIR(r0, 0x0, 0x0) 03:41:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x8000000}}, 0xe) 03:41:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000002200), 0x1000) 03:41:44 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x4e22, @local}}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'veth0\x00', {0x2, 0x4e21, @broadcast}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x80000083ffe) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000100)={0x5, 0x3, 0x1, 0x5, 'syz0\x00', 0x7bff}) 03:41:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1007400}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1524.571592] kauditd_printk_skb: 181 callbacks suppressed [ 1524.571608] audit: type=1400 audit(2000000506.116:30448): avc: denied { map } for pid=32712 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.669985] audit: type=1400 audit(2000000506.136:30449): avc: denied { map } for pid=32710 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.751075] audit: type=1400 audit(2000000506.157:30450): avc: denied { map } for pid=32712 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.842417] audit: type=1400 audit(2000000506.217:30451): avc: denied { map } for pid=32713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.912215] audit: type=1400 audit(2000000506.257:30452): avc: denied { map } for pid=32713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.945935] audit: type=1400 audit(2000000506.257:30453): avc: denied { map } for pid=32713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1524.973959] audit: type=1400 audit(2000000506.257:30454): avc: denied { map } for pid=32713 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1525.001991] audit: type=1400 audit(2000000506.377:30455): avc: denied { map } for pid=32713 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1525.028407] audit: type=1400 audit(2000000506.407:30456): avc: denied { map } for pid=32713 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1525.072240] audit: type=1400 audit(2000000506.407:30457): avc: denied { map } for pid=32713 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:47 executing program 1: 03:41:47 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x10000000}}, 0xe) 03:41:47 executing program 3: 03:41:47 executing program 5: 03:41:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1007a00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:47 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:47 executing program 3: 03:41:47 executing program 5: 03:41:48 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x3f000000}}, 0xe) 03:41:48 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), 0x4) ioctl(r0, 0x1, &(0x7f0000000240)="8d731a98d710a4f7fb300e0b58ce91acc111b7ee973c7401ee349a658dc286dca640ef1aec62d58f474bfed8f54598367494ce6f95eeff244e82ac8aff8af1f3067913ada309fc7fdddea6be56f23943a472832e9d3d1b83ecb80ccd77f66d47736cd612f40a79d9622f81c845cc2c03e52bc2e685bce4d4daf4ad6405f58aeb0e2ff33ac797401d08ed446125da0a2a92ac53a13ea30a45bb5d1e92c44460049cece41a7f779fe84b9009058e8806d2375628853d3d35ea09d6fbd89963950ba4f304871a96ef93a9ebdf2128d7") ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x990000, 0xfffffffffffffff9, 0x2, [], &(0x7f0000000100)={0x9f0b7f, 0x8, [], @p_u16=&(0x7f00000000c0)=0x7}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/mnt\x00') 03:41:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1007f01}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:48 executing program 1: 03:41:48 executing program 3: 03:41:48 executing program 5: 03:41:49 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x46030000}}, 0xe) 03:41:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1008004}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000001c0)=0x1000, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x200000) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000100)) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000200), 0x2) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:41:49 executing program 1: 03:41:49 executing program 5: 03:41:49 executing program 3: 03:41:50 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x47030000}}, 0xe) 03:41:50 executing program 1: 03:41:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x100ff03}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:51 executing program 3: 03:41:51 executing program 5: [ 1529.610501] kauditd_printk_skb: 118 callbacks suppressed [ 1529.610517] audit: type=1400 audit(2000000511.169:30576): avc: denied { map } for pid=32758 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:51 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x24a, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1529.850179] audit: type=1400 audit(2000000511.209:30577): avc: denied { map } for pid=32753 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1530.029777] audit: type=1400 audit(2000000511.219:30578): avc: denied { map } for pid=32753 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1530.259603] audit: type=1400 audit(2000000511.299:30579): avc: denied { map } for pid=32758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:51 executing program 1: [ 1530.419503] audit: type=1400 audit(2000000511.299:30580): avc: denied { map } for pid=32758 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x2000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:52 executing program 5: [ 1530.591887] audit: type=1400 audit(2000000511.329:30581): avc: denied { map } for pid=32758 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x6b6b6b00}}, 0xe) [ 1530.816360] audit: type=1400 audit(2000000511.389:30582): avc: denied { map } for pid=32753 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:52 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x88, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x26}], 0xffffffb}, 0x0) 03:41:52 executing program 3: [ 1531.010313] audit: type=1400 audit(2000000511.399:30583): avc: denied { map } for pid=32753 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1531.199292] audit: type=1400 audit(2000000511.399:30584): avc: denied { map } for pid=32758 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1531.379832] audit: type=1400 audit(2000000511.479:30585): avc: denied { map } for pid=32758 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:53 executing program 1: 03:41:53 executing program 5: 03:41:53 executing program 3: 03:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x3000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:53 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) 03:41:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xe0000000}}, 0xe) 03:41:54 executing program 1: 03:41:54 executing program 5: 03:41:54 executing program 3: 03:41:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfc000000}}, 0xe) 03:41:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x5000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:55 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040), 0x3) 03:41:55 executing program 1: 03:41:55 executing program 5: 03:41:56 executing program 3: [ 1534.641062] kauditd_printk_skb: 154 callbacks suppressed [ 1534.641079] audit: type=1400 audit(2000000516.202:30740): avc: denied { create } for pid=343 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfe800000}}, 0xe) 03:41:56 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) [ 1534.807329] audit: type=1400 audit(2000000516.242:30741): avc: denied { map_create } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:56 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x9000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1534.937015] audit: type=1400 audit(2000000516.242:30742): avc: denied { prog_load } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:56 executing program 5: [ 1535.087126] audit: type=1400 audit(2000000516.272:30743): avc: denied { map_read map_write } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:56 executing program 1: [ 1535.216572] audit: type=1400 audit(2000000516.282:30744): avc: denied { map } for pid=342 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1535.417004] audit: type=1400 audit(2000000516.282:30745): avc: denied { map } for pid=342 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1535.600088] audit: type=1400 audit(2000000516.342:30747): avc: denied { prog_load } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:57 executing program 3: [ 1535.756040] audit: type=1400 audit(2000000516.292:30746): avc: denied { map_create } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1535.955687] audit: type=1400 audit(2000000516.352:30748): avc: denied { map_read map_write } for pid=345 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:41:57 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfec00000}}, 0xe) [ 1536.173016] audit: type=1400 audit(2000000516.402:30749): avc: denied { map } for pid=342 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xa000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:57 executing program 5: 03:41:57 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x142) 03:41:58 executing program 1: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000040)={0x2, 0x404e23, @remote}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e000002055b655747f7a15a4bd3b1852253c557e0e174b1dda4932b7a028e847d3acee20a58aaa807214e4515ae12cc1278c7a71e68f0bfd322184d610cef79ab72155e66069a909858da654051b4bc5"], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, &(0x7f0000000640)) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340), 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/34, 0x22}, {&(0x7f00000003c0)=""/210, 0xd2}, {&(0x7f00000004c0)=""/140, 0x8c}], 0x3, &(0x7f0000000680)=""/238, 0xee}, 0x40) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000300)=0x7fffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='veth1_to_bridge\x00', 0x10) write$binfmt_elf32(r0, &(0x7f0000001480)=ANY=[@ANYBLOB="7f454c467f090003010001000000000003000300070000006201000038000000d3010000020000000700200001000100090076a10000000000000000000000000300000081000000d60000000400000054000000070000000500000003000000000000003e010000010000008000000005000000fbffffff5f2ce9f781a9b41a6452f2d5d23970c0ec959a08f5351086f0ffc5cc82848b6471aaf73a6e9dbc21c04f30e947e8cdb671c901fd8af8e1131bca89ff20ce1b27e78b73bb2c4e02d45444d2279f74b8867846447b3fda157fef61ea51e65e5cdcfbfeec8507b886d13067d6d3cd449049325a4e4cd7d94f00e0852c7955b719b938f96e953a43838db77222a1ea32e40c258fa2a2f949147d93db0157669c734b0ef86ff2a0fd7113b15fbf992d3cfef0d7ef000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b87f948fb6b81b36734e1f0dcc0c25f7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x52a) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) r1 = socket$inet(0x2, 0x6, 0x24000000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0xfffffffffffffffa) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[], 0xfffffde0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) splice(r2, 0x0, r5, 0x0, 0x20000000003, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00\x00\x00\x00\x00\x00\x00\xe4\xa1\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0x5940, 0x0, 0x4) 03:41:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000000)) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 03:41:58 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400200, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000200)="b8010000000f01d965660faeb603000000b8358556370f23c80f21f8350400d0000f23f8640fc7ae02000000ea00600000fa00c4c18566220f20d835080000000f22d8360f01cf66baf80cb83bd30c85ef66bafc0cb06aee0fc7b49f0a000000", 0x60}], 0x1, 0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:41:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xff000000}}, 0xe) 03:41:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xf000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:41:59 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x1, 0x0) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x4, 0x3, {0xa, 0x4e22, 0x5, @local, 0x9}}}, 0x3a) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x0) r3 = fcntl$getown(r0, 0x9) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00000000c0)=r3) [ 1538.498183] cgroup: fork rejected by pids controller in /syz1 03:42:00 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x6b6b6b00000000}}, 0xe) 03:42:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:42:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1fffffff}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:00 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200c0, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000100)={0x20, 0xfffffffffffffffe, 0x4, {0x0, 0x3}}, 0x20) 03:42:01 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='[d::]:/#lb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) [ 1539.764516] kauditd_printk_skb: 140 callbacks suppressed [ 1539.764531] audit: type=1400 audit(2000000521.314:30890): avc: denied { map } for pid=423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1539.895986] audit: type=1400 audit(2000000521.364:30891): avc: denied { map } for pid=423 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x400000000000000}}, 0xe) [ 1540.045987] audit: type=1400 audit(2000000521.394:30892): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1540.224591] audit: type=1400 audit(2000000521.414:30893): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)) accept$alg(r1, 0x0, 0x0) io_submit(r2, 0x0, 0x0) r3 = eventfd2(0x0, 0x0) getsockname$tipc(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x1, r3}]) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x48, r4, 0x31a, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x56e56057e0b132}, 0x84) 03:42:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x20000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1540.429327] audit: type=1400 audit(2000000521.514:30894): avc: denied { map } for pid=423 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1540.597219] audit: type=1400 audit(2000000521.614:30895): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1540.690955] libceph: connect [d::]:6789 error -101 [ 1540.696465] libceph: mon0 [d::]:6789 connect error 03:42:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xffffffffffffffbc) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80400000001, 0x240) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendto$inet(r3, &(0x7f0000000100), 0xffffffffffffff1f, 0x0, 0x0, 0x56c3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x4, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) close(r3) munlockall() fcntl$getown(r0, 0x9) dup3(r1, r2, 0x80000) [ 1540.780896] audit: type=1400 audit(2000000521.624:30896): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:02 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffc9, &(0x7f00000000c0)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x354}, 0x0) [ 1540.994206] audit: type=1400 audit(2000000521.704:30897): avc: denied { map_create } for pid=426 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1541.134130] audit: type=1400 audit(2000000521.714:30898): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1541.224537] libceph: connect [d::]:6789 error -101 [ 1541.229703] libceph: mon0 [d::]:6789 connect error [ 1541.334220] audit: type=1400 audit(2000000521.714:30899): avc: denied { map } for pid=423 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:02 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x500000000000000}}, 0xe) 03:42:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)='/\x00\x00', 0x3}], 0x1}, 0x0) r1 = socket(0x10, 0x800000000080002, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4000000, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000040)) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x214, &(0x7f00000000c0), 0xc2, 0x80}], 0x1, 0x0) 03:42:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x3f000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:03 executing program 2: r0 = socket$kcm(0x10, 0x400000000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000001c0)={0x0, @reserved}) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000b1586b5ea9be397eaa1851d218b4233a0796b898c5aff1e86846f8f4a2d3658a8bc321727072244edb78d9be34618ade7b96de53917808"], 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x467) 03:42:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000003480), 0x0, 0x0, 0x0, 0x2}, 0xca}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{0x0}, {&(0x7f0000006dc0)=""/66, 0x42}, {0x0}], 0x3, 0x0, 0x0, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000007000), 0x0, 0x0, 0x0, 0x800}, 0x7}], 0x4, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000114c0)=@hci, &(0x7f0000011540)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 03:42:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x800000000000000}}, 0xe) 03:42:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000006c0)) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x34, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="006340400000000000000000000000000000000000000000000000000000180000000000", @ANYPTR, @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev={0xac, 0x14, 0x14, 0x24}, @in6=@loopback, 0x4e20, 0x42, 0x4e24, 0x0, 0x0, 0x80, 0x80, 0x7b, 0x0, r3}, {0xffffffffffffffb3, 0x7fffffff, 0x9bb, 0x40, 0x8, 0xff, 0x6, 0x800}, {0x3, 0x9b, 0x8, 0x4}, 0xffffffff, 0x6e6bb3, 0x0, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d6, 0x7c}, 0x2, @in6=@loopback, 0x3500, 0x0, 0x3, 0x1, 0x1, 0x10001, 0x5}}, 0xe8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x10) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x800) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000580)={0x100, 0x4}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0xe, 0x0, &(0x7f0000000680)=[@acquire_done], 0xfffffffffffffeb3, 0x0, &(0x7f00000007c0)}) fcntl$notify(0xffffffffffffffff, 0x402, 0x1) memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000400)={'veth0_to_bridge\x00', 0x100}) 03:42:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x40000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:04 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0xd0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/66) connect(r2, &(0x7f00000000c0)=@ipx={0x4, 0x7, 0xbfb, "bb5a4657914d", 0x7f}, 0x80) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x501080, 0x0) r3 = getpid() ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000380)={0x0, r1}) ptrace$setregs(0xf, r3, 0xaf4c0000000000, &(0x7f0000000240)="15b68e847eb1b8dcaff0bc2c230b25fbe72d5c51100e890c74401f2e21fd2ba6cca417594af6269e6a2ac70c753718b83c463ad0e958605c0bd23c37fa5680d60e8eb088dbdd7e92981ebc65765c53fd16185238176e6bc0dc0032fa0f2aa035bc481d763985e0be98ca16d81c5e787ed397ef353bb186328205d3117fd615eb74ebf71f6478f5a5688e1f0a2da739adf9a0b961fca945b90ba6eb461a60d7a2c6e7a567392e0c16d7391a2c24f6ebed19de30144ecb7a41e237770b96b048c52c2362f045bde2bc8b59dbc91693") 03:42:05 executing program 3: r0 = socket$kcm(0x10, 0x400000000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x1000000000000000}}, 0xe) 03:42:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x54060000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1544.762922] kauditd_printk_skb: 154 callbacks suppressed [ 1544.762937] audit: type=1400 audit(2000000526.327:31054): avc: denied { map } for pid=496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:06 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) r1 = userfaultfd(0x80800) mmap(&(0x7f0000f36000/0x13000)=nil, 0x13000, 0x4000000000000004, 0x2032, r1, 0x800000004) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000041b000/0x1000)=nil, 0x1000, 0x0, 0x3d, r0, 0xfffffffffffffffe) [ 1544.943732] binder: 493:504 BC_ACQUIRE_DONE u0000000000000000 no match [ 1545.002221] audit: type=1400 audit(2000000526.347:31055): avc: denied { write } for pid=493 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1545.124013] binder: 493:502 transaction failed 29189/-22, size 0-536871488 line 2896 03:42:06 executing program 3: r0 = socket$kcm(0x10, 0x400000000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1545.225254] audit: type=1400 audit(2000000526.377:31056): avc: denied { map } for pid=496 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:06 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) time(&(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) execve(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000340)='/dev/vcs\x00', &(0x7f0000000380)='-@#vboxnet0proc[\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='\x00', &(0x7f0000000440)='posix_acl_accessem1,&-+em0$\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='/dev/admmidi#\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00']) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x7f, 0x101000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000002c0)={0x1, 0xfffffffffffeffff, 0x5, 0x47c}, 0x14) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10000, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f0000000100)={0x0, 0x3, 0x2, "81560d5bc30e992a9a62f999544dd5f0db541688a30bfc24f88cccd5f5922419", 0xa663d81ffc866a1f}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f00000001c0)={0x0, @reserved}) [ 1545.404797] audit: type=1400 audit(2000000526.377:31057): avc: denied { create } for pid=501 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1545.473145] binder: 493:504 BC_ACQUIRE_DONE u0000000000000000 no match 03:42:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x3f00000000000000}}, 0xe) [ 1545.651873] audit: type=1400 audit(2000000526.387:31058): avc: denied { map } for pid=495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x17) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000240)=0x2) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000600000/0x1000)=nil, 0x1000}, 0x1}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) sendto$rose(r2, &(0x7f00000000c0)="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", 0xfb, 0x4, &(0x7f00000001c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0xfffffffffffffcd9) [ 1545.831770] audit: type=1400 audit(2000000526.387:31059): avc: denied { map } for pid=497 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1546.012168] audit: type=1400 audit(2000000526.407:31060): avc: denied { map } for pid=495 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x63000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1546.171596] audit: type=1400 audit(2000000526.447:31061): avc: denied { map } for pid=506 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1546.361494] audit: type=1400 audit(2000000526.447:31062): avc: denied { map } for pid=506 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 5: r0 = syz_open_dev$media(0x0, 0x100000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000000)={0xdf, "7881251f8bc50c3c1e1ad56ac632afa77ce00f24e033eed76fd6736806f1ac46", 0x0, 0x1}) move_pages(0x0, 0x2092, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[0x0], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000300)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@ipx={0x4, 0xffff, 0x1, "4baec2d5b521", 0x80}, 0x80, 0x0}, 0x20004000) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000340)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={0x0}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) [ 1546.555726] audit: type=1400 audit(2000000526.477:31064): avc: denied { ioctl } for pid=501 comm="syz-executor2" path="socket:[137795]" dev="sockfs" ino=137795 ioctlcmd=0x54db scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000025c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_delrule={0x30, 0x21, 0x5, 0x0, 0x0, {0x2, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_DST={0x8, 0x1, @dev}, @FRA_SRC={0x8, 0x2, @loopback}]}, 0x30}}, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 03:42:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4603000000000000}}, 0xe) 03:42:08 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x100, 0x0) pwrite64(r0, &(0x7f0000000100)="c518a2f5f03f1b132b3b1014cfcfb4bc27435dbd19", 0x15, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r1}) 03:42:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "92867a", 0x20, 0xffffff88, 0x0, @empty, @mcast2, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, &(0x7f0000000000)={0x0, 0x3, [0x0, 0x2057]}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)={'trans=unix,', {[{@version_9p2000='version=9p2000'}, {@cachetag={'cachetag', 0x3d, '&'}}, {@cache_loose='cache=loose'}], [{@smackfsdef={'smackfsdef', 0x3d, 'cpuseteth1+posix_acl_access(nodev'}}]}}) 03:42:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x7f010000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f0000002e80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2121202e2f66696c65300ae420a0d684b1daf8916c3ad6d9ba6ea9b8a41d7979698ee2b8b81f1e88a4671aa0a1f9af57b729b735834186483b50fa16bd6f871660e51b4e4a961be70299ccf5162811b672882ff1cc64c6c08f8e431a14657b6c252319b300de0962d814760cb85ed8dd6a8beb6d4827a6e8806889ea6f3f2af6b1344c26d7380c0000e5098fb616a989c421f672faeb236b571eab98ee5a2ccaa96f4fcb7d8ba701d5dd101d156c4ef4b94142c0ad073f5f32456aceb2cbf7ff22673ecd59e8d13d9dec8eb07d6966794673ff1f90c24aacd5efa8323d7d446556bc99886b1ccaba026fac13608384be880887f1c145c4d7a756a3fd1c19c2bf11f8d0c7300e83fea464ec2cd3e73ddd2fae4f0b"], 0xfdef) r1 = socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000280)) 03:42:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xe, 0x401) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0xa1}) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 03:42:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0x4703000000000000}}, 0xe) 03:42:10 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x800, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'bpq0\x00', r1}) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000001c0)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000700)='/dev/audio\x00', 0x140206, 0x0) open$dir(0x0, 0x27b, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) r4 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/ipc\x00') socket$l2tp(0x18, 0x1, 0x1) socket$isdn(0x22, 0x3, 0x27) dup2(r4, r3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') write$selinux_load(r4, 0x0, 0x0) 03:42:10 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x80) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}], 0x1c) 03:42:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x80010000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1549.141055] usb usb4: usbfs: process 570 (syz-executor5) did not claim interface 0 before use 03:42:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xe000000000000000}}, 0xe) 03:42:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PDEATHSIG(0x1, 0x1e) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f00000000c0)={0xa7, 0x8000}) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x2f, @remote, 0x4e22, 0x4, 'lblcr\x00', 0x20, 0x7, 0x11}, {@multicast2, 0x4e20, 0x2003, 0x0, 0x8, 0xfff}}, 0x44) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x3, 0x0, 0x7, 0xffffffff, r2}) 03:42:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0xe6) open(&(0x7f0000000040)='./bus\x00', 0x20403, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x200, 0x0) [ 1549.816528] kauditd_printk_skb: 148 callbacks suppressed [ 1549.816542] audit: type=1400 audit(2000000531.379:31212): avc: denied { map } for pid=577 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1550.047484] audit: type=1400 audit(2000000531.389:31213): avc: denied { map } for pid=582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1550.215262] audit: type=1400 audit(2000000531.389:31214): avc: denied { map } for pid=582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:11 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'ip6tnl0\x00', {0x2, 0x4e20, @multicast2}}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x84040, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000001c0)="baf80c66b8e076838666efbafc0cb80900ef0f01c966b9020b00000f326766c74424002000c0fe6766c7442402a03d56586766c744240600000000670f011424b8d8000f00d0640f01c80f00130f01cbba4100b000ee660f08", 0x59}], 0x1, 0x76, &(0x7f0000000240), 0x0) 03:42:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x80040000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1550.359326] audit: type=1400 audit(2000000531.419:31216): avc: denied { map } for pid=577 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1550.560097] IPVS: set_ctl: invalid protocol: 47 172.20.20.187:20002 [ 1550.575738] audit: type=1400 audit(2000000531.389:31215): avc: denied { create } for pid=579 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1550.730614] audit: type=1400 audit(2000000531.429:31217): avc: denied { write } for pid=579 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfc00000000000000}}, 0xe) [ 1550.862198] IPVS: set_ctl: invalid protocol: 47 172.20.20.187:20002 03:42:12 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@local, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000274", 0x14}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) semget(0x2, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000140)=0x5, &(0x7f00000002c0)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_INPUT(r3, &(0x7f00000019c0)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000000c0), 0x8080fffffffe) accept(r1, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x22000, 0x0) write$FUSE_INIT(r4, &(0x7f0000000200)={0x50, 0xffffffffffffffda, 0x8, {0x7, 0x1b, 0x8270, 0x0, 0x0, 0x21f1, 0x0, 0x9}}, 0x50) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0xfffffe9d) socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0x20000000007}, 0x1c) r6 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r6, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r6, &(0x7f0000005fc0), 0x800000000000059, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x84000, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f0000000500)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000080), 0x4) [ 1550.919657] audit: type=1400 audit(2000000531.479:31218): avc: denied { map } for pid=582 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) r0 = semget$private(0x0, 0x4, 0x203) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB], 0x1, 0x0) perf_event_open(&(0x7f0000005240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0x300000000000000}) r1 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x0, 0x200000) r2 = syz_open_dev$amidi(0x0, 0x0, 0x400000) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000300)={&(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, 0x0, &(0x7f0000000580)) accept$inet6(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0xc000, 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000700)=[{}, {}], 0x2, 0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x2000)=nil) rt_sigprocmask(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000140)=ANY=[@ANYPTR, @ANYRES32, @ANYRES64, @ANYRESHEX, @ANYRES16]}) [ 1551.099214] audit: type=1400 audit(2000000531.479:31219): avc: denied { map } for pid=582 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1551.253547] audit: type=1400 audit(2000000531.539:31220): avc: denied { create } for pid=579 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x5a00000000000000, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r0 = accept$netrom(0xffffffffffffff9c, &(0x7f0000000000)={{}, [@rose, @default, @null, @default, @rose, @rose, @null]}, &(0x7f0000000080)=0x48) bind(r0, &(0x7f0000000100)=@llc={0x1a, 0x327, 0x6, 0x6a, 0xba2, 0x4, @local}, 0x80) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x80000001, 0x200000) [ 1551.494446] audit: type=1400 audit(2000000531.549:31221): avc: denied { map } for pid=577 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000002100)='/proc/capi/capi20ncci\x00', 0x80080, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000002140)={0x8, 0x3, 0x1000, 0x4}, 0x6) clock_gettime(0x0, &(0x7f0000002000)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000001e00)=[{{&(0x7f00000000c0)=@ipx, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/85, 0x55}, {&(0x7f0000000240)=""/133, 0x85}], 0x2}, 0x10000}, {{&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000000140)=[{&(0x7f0000000380)=""/84, 0x54}, {&(0x7f0000000400)=""/92, 0x5c}, {&(0x7f0000000480)=""/81, 0x51}], 0x3, &(0x7f0000000500)=""/160, 0xa0}, 0x3}, {{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)=""/89, 0x59}, {&(0x7f00000006c0)=""/15, 0xf}, {&(0x7f0000000700)=""/33, 0x21}, {&(0x7f0000000740)=""/160, 0xa0}], 0x4, &(0x7f0000000840)=""/208, 0xd0}, 0x800}, {{&(0x7f0000000940)=@x25={0x9, @remote}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/122, 0x7a}, {&(0x7f0000000a40)=""/238, 0xee}], 0x2, &(0x7f0000000b80)=""/197, 0xc5}, 0x8}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000c80)=""/194, 0xc2}, {&(0x7f0000000d80)=""/197, 0xc5}, {&(0x7f0000000e80)=""/236, 0xec}, {&(0x7f0000000f80)=""/5, 0x5}, {&(0x7f0000000fc0)=""/119, 0x77}], 0x5, &(0x7f00000010c0)=""/179, 0xb3}, 0x1}, {{&(0x7f0000001180)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000001200)=""/138, 0x8a}, {&(0x7f00000012c0)=""/239, 0xef}, {&(0x7f00000013c0)=""/94, 0x5e}, {&(0x7f0000001440)=""/129, 0x81}], 0x4, &(0x7f0000001540)=""/53, 0x35}, 0x50}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000001580)=""/196, 0xc4}, {&(0x7f0000001680)=""/155, 0x9b}, {&(0x7f0000001740)=""/196, 0xc4}], 0x3, &(0x7f0000001880)=""/107, 0x6b}, 0x6}, {{&(0x7f0000001900)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001980)}, {&(0x7f00000019c0)=""/34, 0x22}, {&(0x7f0000001a00)=""/188, 0xbc}, {&(0x7f0000001ac0)=""/240, 0xf0}, {&(0x7f0000001bc0)=""/89, 0x59}, {&(0x7f0000001c40)=""/71, 0x47}, {&(0x7f0000001cc0)=""/7, 0x7}], 0x7, &(0x7f0000001d80)=""/74, 0x4a}, 0x3}], 0x8, 0x2000, &(0x7f0000002040)={r1, r2+30000000}) accept4$tipc(r3, &(0x7f0000002080), &(0x7f00000020c0)=0x10, 0x800) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001980)=0x0) ptrace$setopts(0x4200, r5, 0x800, 0x16) 03:42:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x81000000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1552.194343] FAT-fs (loop1): invalid media value (0x00) [ 1552.223314] FAT-fs (loop1): Can't find a valid FAT filesystem 03:42:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfe80000000000000}}, 0xe) 03:42:14 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100008447, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x300, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20008080}, 0x800) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @remote}, 0x2, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x3, 0x2, 0x1dd06864}) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000000)={0xf}) 03:42:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x84060000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:14 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000001c0)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1553.427978] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.433159] protocol 88fb is buggy, dev hsr_slave_1 [ 1553.482274] FAT-fs (loop1): invalid media value (0x00) [ 1553.537126] FAT-fs (loop1): Can't find a valid FAT filesystem 03:42:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=@ipv4_delrule={0x28, 0x21, 0x209, 0x70bd2d, 0x25dfdbfd, {0x2, 0x30, 0x80, 0x6, 0x3, 0x0, 0x0, 0x1, 0x8}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) sched_setaffinity(0x0, 0x5, &(0x7f0000000280)=0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000003680)='/dev/ptmx\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmmsg(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xb84}], 0x2, 0x800) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="00001a9c54e71f3be48a086e05a7ce154f3834df226e7afba3ec2a6fecd8a629440200de2d4868b21304581bb7a287e2dc1822e17cc219467dc670b2fe129e961b7ab508fb3f6c0571ee928c4a9e2fe5202ade8d23d92e3142be525ab72ffa90457342bb113e9e2942fc1bc590b673e9482c95c8505ca1509d6db8e9bddddbbb7e142b5fb5031d29d2b06763e413ba9701d9a5f1c759a15249268c431ec659f455c2aeb42019c71506e0994621493f11b2a1d8c24c22b777"], 0x2d) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000300)="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") perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) socket$unix(0x1, 0x7, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1253) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f00000000c0)) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getgid() getresgid(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000400)="70893fe44dc4bcfa4e1b6a20905ce27effbcbd3caad5f9776325ee7f0334f79d8b4a184e64cae7b6ed50969a8f2bc579f85b078ea5675621bb2678e267f4e15d442b5cd4ab3c5c059b9eeecab60164387c760978b3a60441ba97cfbfeba725a31a8d38de6f164af979d479bf95e5f0fe651825a96e908a65430380a7555c1527d855a20b8e4d345d50fb1b6bbd570d11dab0bf7eace2b194dbd6222d4ec8f562199ff248ecb36b0775956da1ec1724c140c5d1e583ec922232e0ebf8d12c35e6d4453e67059c8af755f0c6a119ee2c1e1f12b3c49d31928e611e3e55ca64a7b1c492584ce0a889bdda09887431b0636ec30cd6338c1ddc96c0d0060ac46cd9f5") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:42:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xfec0000000000000}}, 0xe) [ 1553.987730] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.987747] protocol 88fb is buggy, dev hsr_slave_0 [ 1553.992859] protocol 88fb is buggy, dev hsr_slave_1 [ 1553.997899] protocol 88fb is buggy, dev hsr_slave_1 03:42:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup(r0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x1ff) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d000010000020000002000000e0000001000000000000000008001200000002000000000000000000300000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e0000023ff00000000000000000090288a9f40f55cb10000000000e3ff00000000007e4e4a79818610bd333f62f73fc640259631c0c93742013c249d0bb4623f807b01b07336e8a55bb20ac2"], 0x80}}, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x94, 0x5, 0x0, "cbe987409329cf184b1c2ca4669bcf2c", "ce2c405b73e537f80b97bb8c12c083385f066be7c07c89bc29e8ea15a1c5e5d408675b5f79e14a5442d6b4c789b78b92ced5877031ec46150205280963cdf8ce115f000ca5c4d5f63e59ca4fb43fa1686cc14aa90c9931e55d7d5cf6dd9ee492b73b593d412c366a288e6bd86452664de6bc86442f27ac6d9d6304edd75158"}, 0x94, 0x3) 03:42:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x2) sendmsg$rds(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@rdma_args={0x48, 0x110, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x20) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) 03:42:16 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x100) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x87060000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1554.820797] kauditd_printk_skb: 167 callbacks suppressed [ 1554.820812] audit: type=1400 audit(2000000536.392:31389): avc: denied { map } for pid=658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1554.995705] audit: type=1400 audit(2000000536.472:31390): avc: denied { map } for pid=669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xff00000000000000}}, 0xe) [ 1555.128292] audit: type=1400 audit(2000000536.492:31392): avc: denied { map } for pid=658 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.378072] audit: type=1400 audit(2000000536.492:31393): avc: denied { map } for pid=658 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.548071] audit: type=1400 audit(2000000536.492:31391): avc: denied { map } for pid=669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.867425] audit: type=1400 audit(2000000536.502:31395): avc: denied { map } for pid=669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000100), 0x8) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0xffffffffffffffff, 0x4) [ 1556.089383] audit: type=1400 audit(2000000536.502:31396): avc: denied { map } for pid=669 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1556.152018] audit: type=1400 audit(2000000536.502:31394): avc: denied { map } for pid=670 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1556.174118] audit: type=1400 audit(2000000536.522:31397): avc: denied { map } for pid=670 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000003, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x80, 0x280) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000280)={0xfffffffffffffffd, 0x9, 0x52, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000300)={r2, 0x7e}, &(0x7f0000000340)=0x8) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f00000001c0)=0x3) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000380)=0x8001, &(0x7f00000003c0)=0x2) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x2) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e80000000008183ad5de0713c444d000e00000010000340000300d1bd001800000000000000000000", 0x2e}], 0xfffffffffffff05}, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x400a00, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r4, 0xc0285629, &(0x7f0000000100)={0x0, 0x1ff, 0x80000001, [], &(0x7f00000000c0)=0x2}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x200080) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) [ 1556.174146] audit: type=1400 audit(2000000536.522:31398): avc: denied { map } for pid=670 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105100, 0x8) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x81a0ae8c, &(0x7f0000000000)) 03:42:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x9c060000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}, 0xffffffff00000000}}, 0xe) 03:42:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 03:42:29 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000004c0)={'veth0_to_bridge\x00', {0x2, 0x4e24, @remote}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'xcbc-aes-neon\x00'}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="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", 0xff}, {&(0x7f00000002c0)="28107daf28c756d73143d66b52a6d25a05ade0613f18332872e190407ba00e17aefab9f469640fda44b7fa4d6296a774a822489dfcf080910afc8fe611be7a0a7d386f1006197bee5f65991082f5b679da4026f819088f1ded6cea29ffd4bc20d6f7a2b213d1be48cadd89f37d74269c9cf1707a3cf14daffff19a1220e126d85e320d0487be385adee76ea31814d9d5bfbe2be2627b568524c5d75776b51139613fa5ed816bd8250534493ea1f5deb13f5e92151a297d52", 0xb8}, {&(0x7f0000000380)="66f48879dea12458de41776a9106635d96dc8a25f9e92511a8d399483937e022e4e1e2da2a9e80a075148f1e1b600af3b9e80c2e1ab7798cda8f2a37f99382c30107b282191d73afa265ba40c8fd6dd927af1f468e7a993f2235dab5ec1573a53455692eeecde2e571734aee58b5a3fa1dbc70aeef3e4a7d7ffebbbcccc6ef916950f310ef334b16de6f74d91480461764d55dab9d666a4daa9df7c4394825018f10b565b32ce13b65c25142a633f67021078e807d3243fe49b24143d22fa99e76788ecbb52a0610ad799e478e5bfba8ab2f9992b322cbee2899ce072353bdf57a00b7204ae45e205d3ac19976e0acaac21fda38049194d7", 0xf8}], 0x3}, 0x40) r1 = fcntl$dupfd(r0, 0x406, r0) connect$vsock_stream(r1, &(0x7f0000000480)={0x28, 0x0, 0x2711, @reserved}, 0x10) 03:42:29 executing program 3: syz_emit_ethernet(0xffffffffffffff5c, &(0x7f0000000180)={@random="450c03631420", @remote, [], {@mpls_uc={0x8847, {[{0x6, 0x8385, 0x200, 0xffff}, {0x6, 0x80000000, 0x1, 0x1}], @generic="72a4f6ac1357bec011f6bbb50fc42661586d891481fc8339578b63baf93cc76ad13bba14db11408ae6b67cf13d08125548147a9adb3d7f43b05ef0979e21efdc23c3ebe807e53204223fb8106e0333fe7324941f808b914c0a126e847c7e74281bbf1aba8d8c063f9f242e1888a75cfad20f9a43672580da427da78a7aac6b779c164d12b7d271fa7a5b5453adbf7958ad2a8ee69213cf23f1fc0c97caae9d371d2b7779f5dea595bca0a41ed37c3d6379f099161cb0f44bfc999935c5df"}}}}, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x440000) r1 = timerfd_create(0x0, 0x80000) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x1e400, 0x0, 0x5, 0x3ae, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000280)=0x7f, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r2, 0x3}, &(0x7f0000000100)=0x8) getpeername(r0, &(0x7f00000002c0)=@rc, &(0x7f0000000340)=0x80) 03:42:29 executing program 1: openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000003c0)=ANY=[], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000200)="b8010000000f01d965660faeb603000000b8358556370f23c80f21f8350400d0000f23f8640fc7ae02000000ea00600000fa00c4c18566220f20d835080000000f22d8360f01cf66baf80cb83bd30c85ef66bafc0cb06aee0fc7b49f0a000000", 0x60}], 0x1, 0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000300), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:42:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xa0060000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0x2) [ 1567.919862] kauditd_printk_skb: 129 callbacks suppressed [ 1567.919877] audit: type=1400 audit(2000000549.488:31528): avc: denied { map_create } for pid=727 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1568.044777] audit: type=1400 audit(2000000549.538:31529): avc: denied { create } for pid=730 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x6, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\vc\x00\x00\fc'], 0x0, 0x0, 0x0}) 03:42:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0x16) 03:42:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xe6bf1800}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1568.200629] audit: type=1400 audit(2000000549.548:31530): avc: denied { map_read map_write } for pid=727 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:29 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80800, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000200)=0x5, 0x4) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f00000000c0)={0x8, 0x4, 0x2, 'queue0\x00', 0x1}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000240)) [ 1568.390554] audit: type=1400 audit(2000000549.548:31531): avc: denied { prog_load } for pid=727 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1568.508432] audit: type=1400 audit(2000000549.578:31532): avc: denied { ioctl } for pid=730 comm="syz-executor2" path="socket:[138715]" dev="sockfs" ino=138715 ioctlcmd=0x891b scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1568.720364] audit: type=1400 audit(2000000549.588:31533): avc: denied { map_create } for pid=727 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1568.838050] audit: type=1400 audit(2000000549.598:31535): avc: denied { write } for pid=730 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:30 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x6, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\vc\x00\x00\fc'], 0x0, 0x0, 0x0}) 03:42:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x300) socket$inet6(0xa, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x2000203a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setresuid(0x0, 0x0, 0x0) [ 1568.988794] audit: type=1400 audit(2000000549.598:31534): avc: denied { map_read map_write } for pid=727 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1569.200061] audit: type=1400 audit(2000000549.618:31536): avc: denied { write } for pid=730 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1569.293888] binder: 750:757 ERROR: BC_REGISTER_LOOPER called without request 03:42:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xeaffff7f}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1569.359628] binder: 750:757 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 1569.410068] audit: type=1400 audit(2000000549.638:31537): avc: denied { connect } for pid=730 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0x2000004e) 03:42:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000180), 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 03:42:31 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) mq_open(&(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x11, &(0x7f00000001c0)={0x8, 0xf1, 0x62, 0x1, 0xd53a, 0x0, 0x74ff, 0x9}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/97, 0x61, 0x40000020, 0x0, 0xb92582f418162e3d) [ 1570.071558] binder: 767:770 ERROR: BC_REGISTER_LOOPER called without request [ 1570.078847] binder: 767:770 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 1570.430579] binder: 767:773 ERROR: BC_REGISTER_LOOPER called without request [ 1570.437832] binder: 767:773 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER 03:42:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xcd9734) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x0, 0x3) write$P9_RLOCK(r0, 0x0, 0x478a5513222d541c) 03:42:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0xf3ffff7f}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000780)}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10b, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r1, &(0x7f0000000040), 0x0, 0x1}, 0x20) unlink(&(0x7f0000000900)='./file0/file0\x00') r2 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000006c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000640)={r4}) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000000940)={0x18000000000000, 0x5, 0x0, [{0x4f82ba39, 0x5, 0x5, 0x10b9075a, 0x311, 0x0, 0x7}, {0x101, 0x1, 0x1ebfd8b7, 0xd45, 0x8f, 0x8, 0x3}, {0x8, 0x40, 0x0, 0x0, 0x9, 0xfff, 0xeb}, {0x5, 0x3, 0x2, 0x0, 0x81, 0x442, 0x7}, {0x8001, 0x1000, 0x1, 0x6, 0x5, 0x3, 0x1}]}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) r6 = dup(r3) shutdown(r6, 0x2) syz_open_dev$binder(&(0x7f0000000880)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000680)}) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() fallocate(r0, 0x40, 0x3, 0xffb9) setsockopt$sock_int(r7, 0x1, 0x2f, &(0x7f0000000180)=0xffffffffffffffe0, 0x4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000400)={'veth0_to_bridge\x00', 0x100}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8000) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0xfffffffd, 0x1) 03:42:32 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000280)=0x8) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x1}) socket$can_bcm(0x1d, 0x2, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) 03:42:32 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="92", 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0xf6d22a6b726cb556) 03:42:33 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 03:42:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x2}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1572.412784] encrypted_key: insufficient parameters specified [ 1572.468817] binder: 800:818 Release 1 refcount change on invalid ref 1 ret -22 03:42:34 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x1e9cb895, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0xffffffffffffffa4}], 0x1}, 0x0) write(r0, &(0x7f0000000240)="9e89c2c9d0a0795d84402454ca2904133defe5f7de2c0d19bdb90c7002404398ee08a14bb0b53fbebdc6081ee653b1eeb0b3ca66c61d63f180906dee064f5027e1e4682253e6bc63d1de4d457db5c66c4e305983e2f35b7104e57af46b36236a8de1781a9347f41e0e37bfee521481760eb099a24fb71715470a7a393c79ed064e058c8a7cdd2dd56a5ddcc771198ca970127d52ecdd3817592d53fb7cf82c6b55ff5e118654c552601772e9b2fbcc4658c48862b573ee8f711eadd1d87f9e9161fb5557ad385c2be15f544a9c0ce51199378e00855aaae266dc0ca610e7c64c3d4cb437e3c0aadaf107433511207bc2315411e7", 0xf4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000001c0)={0xa00, 0xa1, 0x100000000, 0x4d8, 0xfffffffffffffffd, 0x3}) 03:42:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x40000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) readv(r2, &(0x7f0000000540)=[{&(0x7f0000000100)=""/232, 0xe8}], 0x1) sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000240)={0x6, "2cba258551e4a912b0b36c89bcb2cff260e0b8e57155900bbc47fe62f58a566a", 0x2, 0x1}) 03:42:34 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) keyctl$join(0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:42:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1572.921820] kauditd_printk_skb: 149 callbacks suppressed [ 1572.921835] audit: type=1400 audit(2000000554.501:31687): avc: denied { map } for pid=809 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1573.113006] audit: type=1400 audit(2000000554.531:31688): avc: denied { map } for pid=812 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x3}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1573.318047] audit: type=1400 audit(2000000554.561:31689): avc: denied { map } for pid=809 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1573.359398] binder: 800:818 Release 1 refcount change on invalid ref 1 ret -22 [ 1573.479436] binder: BINDER_SET_CONTEXT_MGR already set [ 1573.488129] audit: type=1400 audit(2000000554.581:31690): avc: denied { map } for pid=800 comm="syz-executor5" path="/dev/binder0" dev="devtmpfs" ino=17769 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 1573.587974] binder: 800:808 ioctl 40046207 0 returned -16 [ 1573.669096] audit: type=1400 audit(2000000554.681:31692): avc: denied { map_create } for pid=828 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1573.867731] audit: type=1400 audit(2000000554.681:31693): avc: denied { map_read map_write } for pid=828 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:35 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000200)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000140)={'icmp\x00'}, &(0x7f00000001c0)=0x1e) accept4$bt_l2cap(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80800) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) [ 1574.043362] audit: type=1400 audit(2000000554.721:31694): avc: denied { prog_load } for pid=828 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:35 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_create1(0x80000) io_setup(0x101, &(0x7f0000000000)=0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vga_arbiter\x00', 0x2288440, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x10002, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x6, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp\x00', 0x64b00, 0x0) io_submit(r1, 0x6, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000100)="296102494be2e3b9d09f54d8d84e90c73814a8ea73c78fea7360b7dc4538ebea308aa1612c131e7583c683740d5ba0b0576cd207295d5405776b6df9e512ca6e93457c9694864df77e267db270b75cc7dccd31e6afad3f11b38b7b861bb2873e9e9f0a2255ce31bbe8f6e2a7b33c4c4e23d586bfcc915b42096e61af26d16d75eea31d2f87629c0fc9f20bb76d1d83f10e65076315ec8141df7655b789bafc31c790852eaec03f47a159a5bfe7c303b282ee473f7e6a2dcc8b0ae1922f51aea92db4545a942f9787912b3e7023fa", 0xce, 0x4a0, 0x0, 0x3, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000240)="7122a20e9fd08927977c5651202a11c2a79432f59764285da71a08f8a9a2f89b05d741ab8f6ed399a07113890a97c6bf24e61132e71b7c18d95c0df6ae9377c18b2b45e5d7ce861a107be9a348dd0f4257a780e32419303e94d56830b642dd35e79af00d94d03c66037c55c52a1b274be3a11f6dbe907032663a5c1545eba3ee353e0ea95e18245f5dfa3a835dc67e7658ada0feb159c48e3286c753af1f3fc3168eec593b14f7be047e553382a37eb8bd8d3c5d17623034d13c2ad781b3d179b355d9d6654310dab9bf2b608cf3533c7f4f5601764023b4402d876872e4e0d1b153187f39fcd67e0cff44eb71068a60e0d5ff6dca", 0xf5, 0x8, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000380)="367753cc1c9ec4465f14272af021622b6d876c8f7c8eb362e340b84121bb29b75d9f445af867e1e9ac48a58147b0f73fb6f8b5f0c54f5e11aa1884c09b164eb6c1d956abd83b2467e1da981628e93adceced94bff2fc2746d5bcfd68c005cce9101a2a0a6c1f5bfba7eada0828503406f727572e46c1", 0x76, 0x8, 0x0, 0x2, r3}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000000480)="6ed6d31db0221120550f53f9395ecc7ed4ca1a68e057c77ffca31d5f55d771b073a5841f04ca9f7d83f412b1964d452cbbbdc33b858b147d4fa86248901455f04c494261b9e45da6a54f938ecb88d0621391ca6e36c3b6d3afd390c91a1fc7caa7822ea52cb2731d09d8c591f852fa6d5c7d3a4f5340a7cf247b02cb910c8264a430ef85cf382120ba7eb95679b7c16008040d78aedfdea1246abfff6550651305f3d8d61391411c63513d844037c379d0fc874e70182d5ccfc200b8cb534b1cfbdd3207b164bfada53f8c", 0xcb, 0x1, 0x0, 0x0, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, r0, &(0x7f0000000600)="532cd2994fbf5de4c56defb554c29530d3233992824a", 0x16, 0x1, 0x0, 0x3, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f00000006c0)="7b7d235551931242af75fd06b7e00a579c3a3c7a6bca662253a9ea71788a2cbf0e0e8bae9dec47f4bb7e728f2d6ca342ae0b4be7f0ffea06822e81bb510406126d99d88557e4df", 0x47, 0x4, 0x0, 0x0, r7}]) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e0000000700e110d0ad136a5e0001002d00000000"], 0xe) 03:42:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 1574.161385] binder: release 800:811 transaction 887 out, still active [ 1574.169101] binder: send failed reply for transaction 887, target dead [ 1574.217791] audit: type=1400 audit(2000000554.671:31691): avc: denied { map_create } for pid=800 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1574.298200] audit: type=1400 audit(2000000554.781:31695): avc: denied { map_create } for pid=828 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1574.428141] audit: type=1400 audit(2000000554.811:31696): avc: denied { map_read map_write } for pid=828 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:36 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'nodev', 0x20, 0x39}, 0x2c, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="92", 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 03:42:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x28002) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x63, 0x200000000000002}], 0x96) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, 0x0, &(0x7f0000000180)={0x1}, 0x8) 03:42:36 executing program 5: 03:42:37 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) fcntl$setown(r0, 0x8, r2) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'veth0_to_bond\x00', 0x3}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f00000000c0)) 03:42:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x5}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e00000007000001002d0000000083b30f146cc28941450eff024a909fa9c3e4bbb837f30f9b86e0c45e0f27c6e5323027154609677e98b861b84147b15bdaf9847012f816cd9ec89f8065dda17b891fb10a68ca5d4aad7e5f6e645ceadf494b2adb03e410a7db69396de546948bf6876b8671d92ba6e16b09f1976ca313d5944bf55dec"], 0xe) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0xb3d, {{0xa, 0x4e23, 0x8, @mcast2, 0x7}}}, 0x88) [ 1576.253955] encrypted_key: insufficient parameters specified 03:42:38 executing program 5: [ 1576.421071] encrypted_key: keyword 'new' not allowed when called from .update method 03:42:38 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000001140)={0x0, @in={{0x2, 0x4e21, @broadcast}}, [0x10001, 0xfdc, 0x0, 0x1416, 0x9, 0x100000001, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8]}, 0x0) r2 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3ff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = timerfd_create(0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/14, 0xe}], 0x1) timerfd_settime(r3, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000000)={0xfdfdffff, 0x1, 0x1}) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x2, [0x100000000000500]}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001540)=@assoc_value, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000015c0)={r1}, &(0x7f0000001600)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000300)={r5}, 0xc) sendmmsg$inet_sctp(r0, &(0x7f0000002e00)=[{&(0x7f0000002d40)=@in6={0xa, 0x4e24, 0x7, @loopback}, 0x1c, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x200400c0}], 0x1, 0x40) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000002c0)={0x2b, 0x4, 0x0, {0x1, 0x1, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) 03:42:38 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7, &(0x7f0000001600)=[{&(0x7f0000000200)="987b0264a91d37a5f1620f5292386a9601af5b906e6b6b9745c90cc56310eae44feb5e553ca013a41984db0605d5e7fbb3a27e308f5517ffa3f09d28f31df78614d84ca8ec6682fd08bb519922ad418f94dc9627f7181560444134ed78b159b71b94051fb92817e81d736330d36708ce764afba4afcb5bb949e7c2f65240a7522bcc529fc83235c5a02bdafe8bbf8714442c4a34c891e6541711590f6c50641aa12b6141dce88da863bb9b620097eeacea9e03162449eb2abe55e4f5e400d64fa063ed79", 0xc4, 0x1}, {&(0x7f0000000300)="085c5d37b77cb9a79a1ff7c3c1c585c18695472a6bf9bc9c07b282008628dd2a77c603ad3285fe213435649d1996ed03b320e26184756601fcf35beb0333dcc310ac46d616ceee42e23490d3445e8c4bbfa3bf9660c0e1e533bdccaeb8b2bfc0305742a8d84d14c82b2f84c2c656b485a46748f708f92c68eb81f85ff73a3a34d92f90bda2d8d2039648e9d914616280e9f97edb48147ae7a1f206678776460df4738b0b2d7ca875625fb8133da9aeda268248196f354524357922179fb668ca81732bdc98e90fc07ac2215d160e25985589e4da30", 0xd5, 0x1}, {&(0x7f0000000400)="5fc6d6fe3e8b4698035fd7683bc6148cef89a2a548a8d953ca6e5715932bc544ae4cafa898a2e0d7708ba65043f91e1850f0cc5bac5da3b08d5300863ef724e0d0edd252ed1e1e5dba91a18b87a465007c330ddd26ad9b9ffd396bf8cb621d5a8cae469c71701bad87a15219c23a3426562275ccd2180a3fadca0d9d34c17c60edcfc0b7", 0x84, 0x2}, {&(0x7f00000004c0)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f00000014c0)="46fbe31110bbbacb9382", 0xa, 0xae8}, {&(0x7f0000001500)="e1648f4e40ff6dc105794fb9dc863d084c1468d0e3ec8f3f1d5c82e4742929748851b212e68ef11982cf4e0598de5d5eed4fc3e71f6386b52fafb2baef8d079eee4cd5d52fbd20f062a7", 0x4a, 0x1b2}, {&(0x7f0000001580)="8259f41a355b9773384d33b8f055c545f44d83249c675d7610a8f125184b16c677bdc144101fba6fc083ab404b90fb8f8bd7ad5147fa7f6cbe03321b8e7d9c5b4d5d72255ae30bbe46c37d", 0x4b, 0x4}], 0x20000, &(0x7f00000016c0)={[{@unhide='unhide'}], [{@subj_type={'subj_type'}}, {@obj_role={'obj_role'}}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}]}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/176, 0xb0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001700)='/proc/capi/capi20\x00', 0x2400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000001740)) 03:42:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x28002) write$evdev(r1, &(0x7f0000000080)=[{{}, 0x1, 0x63, 0x200000000000002}], 0x96) ppoll(&(0x7f0000000100)=[{r1}, {r0}], 0x2, 0x0, &(0x7f0000000180)={0x1}, 0x8) 03:42:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x6}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000640)) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000900000003f30000000010000000"], 0x10}}, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) 03:42:39 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x4, 0x7, 0x0, {{0x1, '-'}, 0x1}}, 0xe) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb8, "5669b9979133c7b90170f542d672e5fe4de73f6941d977729485df8ba1f4352fa2e489b9a0e71b15a9d1c8b6dfd90d349adf3d1eb3590eae934943c48180d1056151d1a9c483161859f536b1a67b2fc1728192e9186abdb3c8fe55247ebefef3ad9cee8311e98be7aa11c4449f092752113ca85db2eb3b3fa62720ff85cd2ebdb05986831f74f6adef07d23ccf6ecc90af104d378d016cb24b5146f46181549dbaa46e6ed7469b5fbd93d52898c165830a17806d8b4ec909"}, &(0x7f00000002c0)=0xc0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x6, 0x81, 0x5, 0x4, 0x5, {r2, @in6={{0xa, 0x4e22, 0xff, @loopback}}, 0x9, 0xa4, 0x4cb, 0x80000001, 0xfe}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r3, 0xffffffffffff13b6}, 0x8) [ 1577.940765] kauditd_printk_skb: 144 callbacks suppressed [ 1577.940789] audit: type=1400 audit(2000000559.513:31841): avc: denied { map } for pid=905 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.142237] audit: type=1400 audit(2000000559.513:31842): avc: denied { map } for pid=905 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.335594] audit: type=1400 audit(2000000559.583:31843): avc: denied { map } for pid=900 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1578.486491] audit: type=1400 audit(2000000559.583:31844): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x7}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1578.664705] audit: type=1400 audit(2000000559.583:31845): avc: denied { map } for pid=900 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:40 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:40 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:nodev 0000000000000000105'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) [ 1578.853580] audit: type=1400 audit(2000000559.583:31846): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1579.021903] audit: type=1400 audit(2000000559.653:31847): avc: denied { map } for pid=905 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1579.192560] audit: type=1400 audit(2000000559.673:31848): avc: denied { create } for pid=906 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) socket(0x18, 0x0, 0x80000000) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) 03:42:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00000007000001002d00000000b58ce71452e16cab8773c1a925bc1ec73515ae63fc8e7a2748f52165ce1a85218cb88d72da59321cae56899df2f05316312d4fe0ee2e3306dc764aee751781085d402c63b1e18427b3f186102f4814765f2a8f15c907abb75fe07cdee474543ac0e878e83fb7514b42e22c298b660000000000000000000000000000"], 0xe) io_setup(0x3ff, &(0x7f0000000000)=0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20000, 0x0) io_cancel(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0xf59, r0, &(0x7f0000000040)="471975202e7e53737ced", 0xa, 0x1ff, 0x0, 0x2, r2}, &(0x7f0000000200)) 03:42:41 executing program 1: [ 1579.454946] audit: type=1400 audit(2000000559.703:31849): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1579.604871] audit: type=1400 audit(2000000559.703:31850): avc: denied { map } for pid=903 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:41 executing program 5: 03:42:41 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) r1 = geteuid() quotactl(0x1000000000000, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000140)="5984122de3f42114face387fd8ac98ba1f53f97dd218a7") 03:42:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x8}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:42 executing program 1: 03:42:42 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000002c0)=0x8, &(0x7f0000000300)=0x4) prctl$PR_CAPBSET_READ(0x17, 0x1d) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x2, 0x11a, 0x2, 0xfd}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in=@empty, 0x4e20, 0x0, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x0, 0x0, r2}, {0x0, 0x0, 0xdf, 0x101, 0x7, 0x8, 0x1ff}, {0x6, 0x5, 0xaf89, 0x6}, 0x1ff, 0x6e6bb6, 0x0, 0x0, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0x32}, 0x2, @in6=@mcast2, 0x3505, 0x3, 0x3, 0x813, 0x20, 0x9, 0xfffffffffffffff7}}, 0xe8) write$P9_RLERRORu(r1, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:42:42 executing program 3: 03:42:42 executing program 5: 03:42:42 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200840, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000000c0)={{0x29, @local, 0x4e24, 0x1, 'lblc\x00', 0x0, 0xa6, 0xf}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x4e24, 0x12007, 0x400, 0x8, 0x3}}, 0x44) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x48}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:43 executing program 1: 03:42:43 executing program 5: 03:42:43 executing program 3: 03:42:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e000000076017db123d36374134"], 0xe) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 03:42:44 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4c}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1582.964658] kauditd_printk_skb: 148 callbacks suppressed [ 1582.964671] audit: type=1400 audit(2000000564.546:31999): avc: denied { map } for pid=975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 1: [ 1583.114605] audit: type=1400 audit(2000000564.576:32000): avc: denied { map } for pid=975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 5: [ 1583.303048] audit: type=1400 audit(2000000564.576:32001): avc: denied { map } for pid=975 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 3: [ 1583.493143] audit: type=1400 audit(2000000564.596:32002): avc: denied { map } for pid=975 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:45 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000100)={0x4, "6423e286351ebb24ef516159c428459a4e0a2934bcdc4b3883cd0f25eb3ff502", 0x2, 0x1000, 0x3, 0x5, 0x19, 0x3, 0x7, 0x3}) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000180)={0xb, 0x3, 0xffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) write$P9_RGETLOCK(r1, &(0x7f0000000200)={0x1e, 0x37, 0x1, {0x1, 0x40, 0x8, r2}}, 0x1e) connect$netlink(r1, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4}, 0xc) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1583.678939] audit: type=1400 audit(2000000564.626:32003): avc: denied { map } for pid=970 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1583.909778] audit: type=1400 audit(2000000564.626:32004): avc: denied { map } for pid=970 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:45 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff86, &(0x7f0000000140)=[{&(0x7f00000001c0)="e787210f59f2c59b1ed6df0ad95e4bf3b4676774156c2498a0456e41d09a79a940376c0082edbc409b03656f266cafc3775496b597f63b3a8b367cdc665c6a75a8792f28e89cc13961484051bcd89014356f7ce8d3532d50b6278e4988150616b5e4cf8823dc696157c59b8efb6d41ce1e1866a9c198c261cc854133374e938e7e21ac804d587cb0075390f7db0baab37052876f4d98b52402a0893158d9ca27bea0c1bf32ca846ae9fa5ccd8748608ed0ba867e9b43c9ded6eb00d1fae2297d166f0c6f9b7d9afddc2fd34fe4ae48da16afdce35c4c727b71e1406aaf012b"}, {&(0x7f00000000c0)="e247cfea0866fa45e57270ad158cf4b07641ee4913c14021646d6e6280c4aa7e9d346293a5481ecabcd37b88b1db6fffca7e55c25db355f04c9860f2480eb719e8741a3be238fdc7d8eed37a371c8f1e0f7186da81edbad6a50ea0dc8d882d3ba7e333b75d3def40e4a3c6eacc"}, {&(0x7f0000000340)="b20bf7cd51bb1cb6872b025ddbd2d54588c52050ef6c8f80ac15b02745db605eb05d4f9d6d89b99465d9849e615edfdfe98d6c34ba9ab04a16", 0xfc97}, {&(0x7f00000002c0)="7bbc7e9cf3e5662a0ed912bf0cc01805c686f847b5213a7792dc59a0f085f3fa74688cbbbcd7d1774080d801e9f69372729861c63be257a2c9e5fc02ed3eb5bff1d51b89e24ea5c8a5f638cacad7999c308dd739fc6fc2b1318562e2ddf3ba"}]}, 0x0) [ 1584.112726] audit: type=1400 audit(2000000564.686:32005): avc: denied { map } for pid=976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x68}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1584.252696] audit: type=1400 audit(2000000564.686:32006): avc: denied { map } for pid=976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:45 executing program 5: 03:42:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000240)={r2, 0x10}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000600)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), 0x4) lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000780)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="00ff150007e80000a500082413c44f2484f116a185"], 0x1, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)=0xfffffffffffffff8, 0x4) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x1) fchdir(r3) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0xa0}, {0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x7}, 0x7, 0x6e6bbb, 0x3, 0x0, 0x1, 0x3}, {{@in6=@mcast2, 0x4d4, 0x2b}, 0xa, @in6=@ipv4, 0x0, 0x0, 0x3, 0x24b, 0x0, 0x8}}, 0xe8) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aeea690e1b2ae74539f93951bd347b009f0a3c8a8e00601fedea17da1f9cbc6ed07bbce8417e3d1698cf0e8516d9bd32b8ca38d983301ade32af79fd2fe2d07000000f48af1b24b0b41db424d25728e9e9607ead4eec9518c62a62e50075cae8292"], 0xcd) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) [ 1584.392729] audit: type=1400 audit(2000000564.716:32007): avc: denied { map } for pid=975 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:46 executing program 1: [ 1584.553800] audit: type=1400 audit(2000000564.786:32008): avc: denied { map } for pid=976 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:46 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000007000001002d008551d4f03fe265e784f6b1315e2a1da8000000"], 0xe) 03:42:46 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x400, 0x0) getpeername$unix(r1, &(0x7f0000000280), &(0x7f0000000300)=0x6e) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) ptrace$getregset(0x4204, r2, 0x202, &(0x7f00000001c0)={&(0x7f0000000100)=""/99, 0x63}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={r0, 0x0, 0x7, 0x8000, 0x6}) 03:42:46 executing program 5: 03:42:47 executing program 1: 03:42:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x6c}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:48 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r2, 0x0}) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r4, 0x800000010d, 0x800000000011, &(0x7f000045affc)="02080000", 0x4) sendto$inet(r4, &(0x7f00009f5000), 0x0, 0x0, 0x0, 0x0) bind$x25(r1, &(0x7f00000001c0)={0x9, @remote={[], 0x0}}, 0x12) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000280)={r3, r5, 0x1ff}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000200)={0x0, r6}) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00001207000040cf017fa1ef7257db67d7410b2bcdc2d5fd1c17d6e1bbafdf3ce05736eb94589bae0b8ceb177bc8cec158aaeb41326a6a7e45ce502ddedfbff87c139f28e723a63274b4c94248a0536505348827149f00"], 0xe) 03:42:48 executing program 3: 03:42:48 executing program 5: 03:42:48 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x80800) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x3c, "9ed2f2a18ac0de9dd8a8a4ab08cf48a5bdd3d873f7cded30cfe22fa9c80846c81b623889bd47a9fe9b74d228e75e003a85ad825420520c72594c3346"}, &(0x7f00000001c0)=0x60) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffefc, &(0x7f0000000040)=[{&(0x7f0000000180)="2e989f8e8aaeac46980000002e040000000000b7483a47b16517970800444d0070bce44c3d450800000000000000", 0xffffffffffffff16}], 0x110, 0x0, 0x2fbdc704ccb04d51}, 0x0) 03:42:48 executing program 1: 03:42:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x74}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:49 executing program 1: 03:42:49 executing program 5: [ 1587.972367] kauditd_printk_skb: 149 callbacks suppressed [ 1587.972381] audit: type=1400 audit(2000000569.558:32158): avc: denied { create } for pid=1033 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:49 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) getgroups(0x4, &(0x7f00000002c0)=[0x0, 0xee00, 0xee00, 0xee00]) openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x20000, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}], [{@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@permit_directio='permit_directio'}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '-'}}, {@pcr={'pcr', 0x3d, 0x3d}}]}}) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:42:49 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf={0x6c, &(0x7f00000000c0)="cba1135eb20d84b9a7629b9b1167615bed16a5ca6d0c0dcb3b9f7f76e361a46fda352fccdacbb03033d47cd346e7eb9c647ce5de33806c34a3c1de75a10d00c72a492f5d19576b7a38685fb87072c1c9f92102bd8ab411e92acda4608cff3221f7c916fb4e42fffbfa019ce2"}) [ 1588.150628] audit: type=1400 audit(2000000569.578:32159): avc: denied { map } for pid=1036 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1588.310544] audit: type=1400 audit(2000000569.638:32160): avc: denied { map } for pid=1039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:50 executing program 3: 03:42:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x7a}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1588.453265] audit: type=1400 audit(2000000569.648:32161): avc: denied { map } for pid=1039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1588.661364] audit: type=1400 audit(2000000569.688:32162): avc: denied { map } for pid=1039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1588.850436] audit: type=1400 audit(2000000569.688:32163): avc: denied { map } for pid=1039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:50 executing program 5: [ 1589.047520] audit: type=1400 audit(2000000569.698:32164): avc: denied { map } for pid=1036 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:50 executing program 1: [ 1589.281545] audit: type=1400 audit(2000000569.718:32165): avc: denied { map } for pid=1036 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.473827] audit: type=1400 audit(2000000569.798:32167): avc: denied { map } for pid=1039 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.655573] audit: type=1400 audit(2000000569.838:32168): avc: denied { map } for pid=1036 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:51 executing program 3: 03:42:51 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) 03:42:51 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000001c0)={0x45, 0x3, 0x0, {0x5, 0x24, 0x0, 'system_u:object_r:crypt_device_t:s0\x00'}}, 0x45) fadvise64(r0, 0x0, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000001500)={&(0x7f0000000240)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000280)="8d811d3289d1476a5bba897795834ca6a712fb4221172a7c63984cbfe84b04e4755104495d7acc11dcf99dd4fdfeceda62a18f62634062ecda1df964f16ffb1538fc72efe88431eb821862f6a8e73af3dacbbed46a25e719de626760ba97c4d303ee09c3924c75c51ee14e30232046bcf4aac03c150f8a11660506fd34534bc7677d9ab8e854432808f4d31be5e6a1b93ee5e1cf99ff7ff113d7aec6d1a1f61ad584174103c24223c75423523a2c93998f2791498c6e76177d9d9f5d788def83e38e933fab84c9ec6c94388b1ef8556e81238526ae6885a4b780ea6f07fd749611ed273b4aec3942040045e106f6eb5164b2c39a73ff41", 0xf7}, {&(0x7f0000000380)="209f368d24c431a6cadb78c3f1c33cc921ab1a505dd86b6b12a293dab7c861a20d6aca9b1e9076d4e1450b0601643766938bdabaf5a0062f3062bc239f49ca8fa95f7336c20b79359430ec231e00c583c1a56dc1b7a0d20cd5e5e6b67162ba65480cbeb12d030f3d044892b1cee6b552358f471997ff59b0705de4e459e71f6b149531fa2e90a8a87df6510eee4b39d8d60a36e904e141d0797224b4f65687ba0157d48c483d55504c432b871625bb81e3bc910d417691b8e6bcb1ddf771f0a21fd3836d010f6cd50e7ce6f0ea5bf6b01e0b911b4ecef9859c9306d5cdf94a85", 0xe0}, {&(0x7f0000000480)="5661b426f2", 0x5}, {&(0x7f00000004c0)="a88987614135fb5932ca19f79dec5a5d42b5503e524344dc00f78833011b99ce73352cae54ca385ca44a61d6451aeadb312407a30ebb72b9d527949410d67b5ff19a60fa886fc32efb9574114ce3dc39cafc40831f5a806dbbf4d7ef33dfdd10eb067b4eb045b7fbe444cbd0ddd846b19834ec0a2dac126626b84421f03e5eb72e21cc1c43dcdd8f0a57d5160a7f255fbc2d327f02121edb4bfe0d505dfaced7b0f635e1bc401194ffd49132370ae037b4fbc869333dc87932fe3dddb3bf62f6569f796fe9b1aa3f0f8023081425b66912a0f48822e19e5356e044649b7c780926a316523fd342f4ca29f5b92d12248c70025161fdae535fdde2b64b943d85e849fed6ed1da1d18aa710a09908c22f476f999d5f1007069d4f4ca09d0fdef01c9f667da461a57d716f9a87afc44ba707448bb3c94db242c54c282df06a84c56ea41e909cdc9ad96b0e43a9b71a3785e4e59552e1e5f876c1a292a66139872ec8730c0041c8006076590c598ab2ce53dd52083d5c6f4f7b4420a875729ab9510aa25b71b62cd8c663c4fe24af3492d2396ff7826f2aada779ae9bceaaf8508b2b60216598128decd8d1ec043c81bfb6f177f9c1c58b1bb347560a4dc7c767f70456b4c04b2ad9aa8930d2d049b299a61868b859deb7f56f5b6d138f600c5cb76838f85647bdb228b8ea5639f5d5f8605d620ec28267d5043c235bd29d362464327abc3c2a3807e53c63be2386c5076139dfa08691ef75765ed3e465f0e64bedb65d95551e42cd9914dec6de5984cb8fcd1411561fc33528ea727f075dbe413197f2a08164e859445d141a22b28cfd8b9b3c9d68168981a030ccc3699c4d61262d6d6df79316e051a88bbb8a434e93e5717dc34b53840ddd616ee1405ba54b9cc7127eb79227a7ac208f827eba8c8594822eaaff7f729e929b8a58923486b0f2c4d3cff10adeeedba20f22ad1a8ed4895528a0a484f392faa7cca9db371c5fd0a2f7f348710a4317988c21db2b9f0e188f3943bfeef83d3fd04175f4c1881150d53934d59cbb95857ab3432a99e032bb74956a775859db8e74b6f8a697efa3d0105398ef7fc278690311b58e09a7175c192e43256f670080173aa09cd64627fdb7d858106f4299b486def6ec79169db4ff57521d7800e120f0f5232a79d5fcd5b6702b6495f20629f21467393470e2cda29a44027e123bb82140ca66b6f011e6d59a138b86b85a0b47406c5c715e7ca996c70bcc089b1d7da1f52c5999223eaf85d7fa67adf8017e4cfbf69105a64d53e052c54805446a6df848bc72e93f52f439a0bf46db194b09a0de340fac6b0b94d75925b1d70355af7e35b584e6a2bd9cfc6229e16d85540954b426338e05703c23ab344fb7c186883840019475e5f018bbebaafaebc6bea004ce652528535b4abfccbba4004a620f331682ed22ea6b5e1c95fb038ae646b35f60ba342857a6954709155d7b9a76c0bf0e5f7c55719e1cb3cdef8e50481289b0ea0bea4e6fed4065703137c865b2f521996d57f9d6cd05edf8ae9adb2b28990b462f190072355a37c432adcc6af7424c4de6057059d515485ed66e3a86f8771cdf64512bbd514ac57620a57afc2eb9df2ba65d43bd4b33072b1d290fd535315c67d485dd65b20bc4962d1a2be220ecf1cc02534f47d8e54681d329305e88c881136b6ffee7cbee30d709d6cf5cb97bd66448d05d0e9239024450b9c8b754fd3a3abff9d279872e1ac0ae7c667a62b57835f481d9daa2374fa162c6775e6da617babfbc20fa7a734665ea296c8a59592b5c619aabd8451f1e8fbec682ee26051e56c39d7bf673c186bd3980f61de0ed80083cf1518728488d3a518668bfb20e4de1e98b1c648a2e55f68ddd868d88e2cb25decc7360c0c2799a46cef25dea2ca964c407372c91429b577006f4b6b99d4f04ecc608a44245add0b4b17045d4fb5401dcf0ad87b5ee448b8446d63a060fb2bd7b3b9853bb09221d8690e814b0b497d6182073e1724b8a5949952af0f6252680924e5ada3a687ceffbc30d310b1301590537c432157b7f8a83523c6b17a9084c7921600fcda0884462908e2a6801bc43c1ba2ed9b729010d105855e635f6f36793581c10290c0515285b7467f9afb16ec7fa28262d838a15ea670be1cb66efd42da8fc73eeb31406acc643b794fa385f6c0e06b66c1d78444195c9d79da53ad3daa94038937024af9fa7054b2734a2a73ccaf7c1c34bf3c28a0948ee47ea4f4f755f700d7c451900f078a4452d8cb1314a0620ceaa7f8e353e4619556c1e422c52e6f1a38aaed8965bfbec3a6a18fd0a38151eae398a4fc32d304ce6059309b37e32614ca468bb331ad48ee8c4b7f9bda7caab8593217a54544ef59a0ad24e052d12f641e75f4338f424c0528a026b559992c09034722daf9cc72e04745761e85e759099485dda55f9bdd834e333896c9ea5dfb15a9316a9e9dc8cbde3482c63a004777a0dbf551e37202e8a17915dc8ec71bdce1ceda3332f533d9554ea7cb4c21641010b74045e3f1bc693a94d795a442b8fc8611f8a1edc7b22fd336a5e8030c91d99f06f61c9fd094c1ed5d7dffacdac23c766ad30d22c05216800a06a962816a499f913ed56880167b5955fa50f0c965aeb81c3aa04295d03fd9f59e913ccf6df66edc80e4cfbc1343f5a8a7406c9cddc6565116b12165219cd27ea213afc8a9c46f7c6c4a14a95effff45374f23f9a96eb7af95f4810a06117cb90dcd88a1a2a6b480dbcc02347ace0c7b337120c653e888482b7b43fe8db7aefda06581ca13602d5e242e1610c0c02ffc8593dd80bfd46878ce85e9bcff8df4495f005a836f89bbb7cb09d39d2f13c727b1e458314e5eac598189eb4611124af3e11ef16474bf83798dc9ef73c8548a8564381eb8749567c8bff88b07b87dd3db199f37ca43b5d68ea64edae6aa68bfef0ad1f3a5fa3d5c2f17c722253ef8214c93e7353e9bd4cd46cc2592da06d1b18b10f3190503dd21d8328d7be94e2331c8534d2b70809489e95c957ca6d1497f7d7b95522d2ac4c83660c4fe1c499d1e4955e4eb009056fd689c10ab91c9d4002c9925d05f34b6091eb884faa928437e944a2ea52afa7123194f950c1b4e68fa47cc127deaae9d5ead642fb063c9c19ff0adf89f9fe08c8365c1912b02c224592ede43e6d3a506f8c25a56f11adf31296087cd76f3a57a1af43c002332ab7bd963e5398d053bc8cbc35d105ec2f6cfb0fc0804b577a56cc4a09d00cc375b49b261a94ab82d6d77f6a644779662640f9a0093ea2f77c2092b456e0f84589b06a11c71e37985c5695f07f934ec93a278ad32b534e23b2d9b094170fb49250dd071371912be511b8da3a77a0f1ad6a36c1069466d248d251484621e167f284278b8196e078fe47d06b6829b3a5d2ed6a48015558e91f3f6b9dbbe42f0a592ee26fa9c38f2cfbd3d16c1d075bed10db859de16d60ba74aa8d45737e411151124819968f53ae80ac9a29d5dc9823adc4b285e98e908d1dbe10d69df9233dbc3b7bf6a37410a957d6636ddaa26e3065c9fa4a30b428e0c80981473651c6ef0500ace7650bfbbb720526d29b0f8cd0a39542824d7216ddb3fabe049979f6f44d981034ae47d38db09502db4f02bd10f59eefa4752c72b14cb8d9ad62ac45a886722940c2fa4717adf5c3a81e9cb47cc73e68f40001ccc66e91f71112a11dcc20ba779905f170d663099c9e48adb6c416a3758c452561a7723009ef721716982e32b3de184a1651599228ced345a992e37962653d1b895d1d3aa53955cd16610f79786938af749248c2142d8e3856525d48b0f738e837e215b920a5d9df60888e7df69d4ff09ff10bb17cabc99b5500a63445649ecb610bb789f539be9e336391c25ca95ca2e4b260ca0a933daa490502560c608c02c3c0b35d463af69bad284d020afc14c2122dd414691233bfa170828a38962b07f54d6b1a18576695604e858924e7ff0f9af5889ccfa9dbdc74fc30e9b10f3e8ed0cc8bb95e393769156d3d17e38291596be0ec9c2866d2071c57567984bf493ed1b652059672ecde9fe8a77efbfe32539a9c192a1db447e4a709fb8db5865a853dc851bad6e7a719ba7939ca3e9ca7dad0e37e4ab07353ba917cbe6e2b54e856ec0dcd7a24dc24b43eef1b93e4732c5c5322b973d095b9e81be09c37034b948bfe98452173a9459eece9a33a50c469ca141cf3ce935b1d7ad00df3c43ffd31b5c2e7c45df9c3ccaa034884cdc0c7fb7f44605288f45d6372430550fb0b5dffb48b03f2cb67c5786db4a234e5c5b6241b2ebe9484ca63415288bd03d29feb6a747c86d7625add9074d1f283caa3cf257fb675fa0643ed33ffb90d12370f0d758f9cb7b399736da2ff1a3138ace055834f3828a2ef2639dba6997a3637611336b93a34e96de45fb899f721580361eacb44fa44bc78d7328278af437de901497148314d97d82fb72d3dd9f4a10cc164cd2e12ed5e539525e9652aaf17296eb4c81a8b1d9c58f81220986317eee8aeed4e306e9a0290224379d930052e8487e475f823c1b3b185e336d6b53b9a13d1083c056262a2e2bfbc56fb62038d19c796eaca72864dfdbd06723312fe3fa6a2574747071b7aec2bcd09763de6c2e733fde285dc619af7c14a2b79d4537fc864430d7447d3c606f9f6fecfbf11ebe5dcfe9e5bfe4478b52aa342a1db163afa6fefdb09668837540d2379e6757727c92f429a878a6dffef3f028c66624ad06ee16baf5942fc82be2db017ec041d87440c6c584610eb85e8291dd489cee67c413475d548e70e49537f171e590a79ab90998df2c092655ed4d03ec7e2c634cda2d000580b3ebae967810a93a13a0add531b00f39efb9ea7bc8dcd8ffed267c6faab000e34fa77b9c4becb1a3cf0ba9073a8f82c20e6c09f99030e2219c1d8842a83ba380f953decd165ccc7dedfb1c9509a2b8e79cdb31c78c967d510749ccdccb56f70baaef1d1fd7010c003afd16d6bfa8bad3355d5959ec950824766597aa65a5f5a35a795d46b8d7a324659708b8214f9cf0c0d8cf539b03e94ebb8634c3ba945c9b278f2120b10471d13afcedb79f7a1a59df12ae63117dace7c2ff945e7902bc2dee7dcf5f34da374cf6cb345dbcce1203b5d34c8e983a61dcb8e39024dfa30888705a46f4f4c6a6f5d46d2b91c2c9eea52cebe70a330108cf04c8d444f5fbe0ca8368d6ba2c2033d80efd96cdcb04690f5c3f1545cd42409aed272b6bea99f4f2cc69d8ecdf669742878099e280ee2ba4869e4e59e247764115e48bdf25e733d2664a33977cc8587d15d3fc18573f402695d2c151b89930aa1d281bd8bb5685aa1672b07b29eb2ccffbf8bc53c807e89fcd74a49c91090a9241b9db91c5949bb1cce5865b8e1432ab34d94dd018bd0587df65b475a4ec451e882f4835c8b50ff316eaf6fb5f50639f7ee467c14d293103b39c5efd011837a3012ee757ed13ee8acb96b1712ff21510b63f1e178e472b09e3f82d4b73e781c4823eb7caa1fda55680f233bc1df8275dcdd7a1edf4c998c86cc7d5999f28e0c4a7481cc280b08a851db06127ec7a9f7016873567492fa469616357caba44e6aa0cac0484e48609fd2f245af810cec100ecb5ab7c32a01e660174c86b7ebcaf2430ff44ad29de42aa157b23864b543d16e8b0ad8567f5033cf8bc37709b593674e062ae19285cc004123469497251c3545abb0d5d98ba906553f0ee894802db19f678586703d8eb28474910f08942acd99deac1161148569a2dd6ef269c7035dec8b", 0x1000}], 0x4, 0x0, 0x0, 0x84}, 0x20000800) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:crypt_device_t:s0\x00', 0x24, 0x1) 03:42:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x17f}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:51 executing program 5: 03:42:51 executing program 1: 03:42:52 executing program 3: 03:42:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00000007000001002d000000000f5e04b081e5405d025d30541657b3f32d8c1caecdc1b6bf97d4e0ac596294cd38d3cfbf43dbe0387f5c3b116d6bed3d37495099663f8f4b83dbd6f5338ef6a4cb48af91e311bfa15f281d046ab3b417683d6c6d1579fd219acf093d453a490701e06791003700000000000000000000000000000000000000000000"], 0xe) 03:42:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x219}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:52 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:52 executing program 5: 03:42:53 executing program 1: 03:42:53 executing program 3: 03:42:53 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) sendto$netrom(r1, &(0x7f0000000100)="bc48bbef0d72c5c0e2e1923edfd978003e8c7eca40f843248a29cdf28e37ca6a0a94c318e9adea5e4d435f7b81d7d54e7378fb4344da0c04b658b150eed01c25c9", 0x41, 0x10, 0x0, 0x0) 03:42:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100, 0x200) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000000c0)={0x1f}) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7ff, 0x200000) 03:42:54 executing program 5: 03:42:54 executing program 1: 03:42:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x300}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x803, 0x3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) inotify_init1(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) dup3(r0, r1, 0x0) [ 1593.142507] kauditd_printk_skb: 155 callbacks suppressed [ 1593.142523] audit: type=1400 audit(2000000574.731:32323): avc: denied { map } for pid=1109 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1593.348817] audit: type=1400 audit(2000000574.781:32324): avc: denied { map } for pid=1109 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:55 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) [ 1593.509128] audit: type=1400 audit(2000000574.801:32325): avc: denied { map } for pid=1109 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) r1 = gettid() nanosleep(0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 03:42:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000cc0)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:42:55 executing program 2: r0 = socket$kcm(0x10, 0x7, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x8000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) bind$packet(r1, &(0x7f0000000600)={0x11, 0x1f, r3, 0x1, 0x8, 0x6, @link_local}, 0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e22, 0x9ea0000000000000, @ipv4={[], [], @broadcast}, 0x8}}, 0x4, 0xfff, 0xfffffffffffffffd, 0x1}, &(0x7f0000000140)=0x98) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) fsync(r0) fsync(r1) [ 1593.677957] audit: type=1400 audit(2000000574.811:32326): avc: denied { map } for pid=1109 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1593.847752] audit: type=1400 audit(2000000574.861:32327): avc: denied { map } for pid=1109 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.017654] audit: type=1400 audit(2000000574.881:32328): avc: denied { create } for pid=1108 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x347}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1594.181133] audit: type=1400 audit(2000000574.911:32329): avc: denied { create } for pid=1108 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1594.397553] audit: type=1400 audit(2000000574.941:32330): avc: denied { write } for pid=1108 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1594.572418] audit: type=1400 audit(2000000574.951:32331): avc: denied { map } for pid=1111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.766408] audit: type=1400 audit(2000000574.951:32332): avc: denied { map } for pid=1111 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)={0x0, {{0x2, 0x0, @initdev}}, 0x0, 0x1, [{{0x2, 0x0, @empty}}]}, 0x110) 03:42:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_create1(0x80000) io_setup(0x101, &(0x7f0000000000)=0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vga_arbiter\x00', 0x2288440, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x10002, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x6, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp\x00', 0x64b00, 0x0) io_submit(r1, 0x6, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000100)="296102494be2e3b9d09f54d8d84e90c73814a8ea73c78fea7360b7dc4538ebea308aa1612c131e7583c683740d5ba0b0576cd207295d5405776b6df9e512ca6e93457c9694864df77e267db270b75cc7dccd31e6afad3f11b38b7b861bb2873e9e9f0a2255ce31bbe8f6e2a7b33c4c4e23d586bfcc915b42096e61af26d16d75eea31d2f87629c0fc9f20bb76d1d83f10e65076315ec8141df7655b789bafc31c790852eaec03f47a159a5bfe7c303b282ee473f7e6a2dcc8b0ae1922f51aea92db4545a942f9787912b3e7023fa", 0xce, 0x4a0, 0x0, 0x3, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000240)="7122a20e9fd08927977c5651202a11c2a79432f59764285da71a08f8a9a2f89b05d741ab8f6ed399a07113890a97c6bf24e61132e71b7c18d95c0df6ae9377c18b2b45e5d7ce861a107be9a348dd0f4257a780e32419303e94d56830b642dd35e79af00d94d03c66037c55c52a1b274be3a11f6dbe907032663a5c1545eba3ee353e0ea95e18245f5dfa3a835dc67e7658ada0feb159c48e3286c753af1f3fc3168eec593b14f7be047e553382a37eb8bd8d3c5d17623034d13c2ad781b3d179b355d9d6654310dab9bf2b608cf3533c7f4f5601764023b4402d876872e4e0d1b153187f39fcd67e0cff44eb71068a60e0d5ff6dca", 0xf5, 0x8, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000380)="367753cc1c9ec4465f14272af021622b6d876c8f7c8eb362e340b84121bb29b75d9f445af867e1e9ac48a58147b0f73fb6f8b5f0c54f5e11aa1884c09b164eb6c1d956abd83b2467e1da981628e93adceced94bff2fc2746d5bcfd68c005cce9101a2a0a6c1f5bfba7eada0828503406f727572e46c1", 0x76, 0x8, 0x0, 0x2, r3}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000000480)="6ed6d31db0221120550f53f9395ecc7ed4ca1a68e057c77ffca31d5f55d771b073a5841f04ca9f7d83f412b1964d452cbbbdc33b858b147d4fa86248901455f04c494261b9e45da6a54f938ecb88d0621391ca6e36c3b6d3afd390c91a1fc7caa7822ea52cb2731d09d8c591f852fa6d5c7d3a4f5340a7cf247b02cb910c8264a430ef85cf382120ba7eb95679b7c16008040d78aedfdea1246abfff6550651305f3d8d61391411c63513d844037c379d0fc874e70182d5ccfc200b8cb534b1cfbdd3207b164bfada53f8c", 0xcb, 0x1, 0x0, 0x0, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, r0, &(0x7f0000000600)="532cd2994fbf5de4c56defb554c29530d3233992824a", 0x16, 0x1, 0x0, 0x3, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f00000006c0)="7b7d235551931242af75fd06b7e00a579c3a3c7a6bca662253a9ea71788a2cbf0e0e8bae9dec47f4bb7e728f2d6ca342ae0b4be7f0ffea06822e81bb510406126d99d88557e4df", 0x47, 0x4, 0x0, 0x0, r7}]) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e0000000700e110d0ad136a5e0001002d00000000"], 0xe) 03:42:56 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x90000, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)={0xe, 0x7, 0x0, {{0x1, ',[GPLlo'}}}, 0xffffffffffffff7f) 03:42:56 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@rc={0x1f, {0x1, 0x4, 0xffffffff80000000, 0x9, 0x100, 0x800}, 0x8}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="5b40b4aa8fcdcc02b25d5f0593d3364ba9a18919dc263f5950f218b047c367416b6141c2d0bbbbef85d0aa1f427c0fb69d07951965adf44b803a54695e218e612fa69cbae2f01c7f18d912ff73461d126c439b915344ec325c210f9ed9a309887794df1870c14ff178e9b309e3f9b054cc3d95626f25997f5e3ced1a7a85c7a9f039651ef3d84b797d992ecea1bde6775168c735baf31dc008213790be209b52569ddbe50cdfdcfe55005084af6723d275776324883062a58d38fa40e180bef49c88325cc0ca36216291b3b81a7f69fdbd23d54ed91db138226878af8950cfef8279c0870ba39be7ec1f7682e0", 0xed}], 0x1, &(0x7f00000002c0)=[{0xf0, 0x10e, 0xdb6, "3a9dd61d08e8001886edc1caa9f57e918cc78f6d7584423404ffd74b75f1dfae0f7536b8b4600667b118fe7e02a8272d9da9f5d800e21af030605fa9d6e7c6af7c2d7d8424cc47bfce2dd2099884b233f2c9029f03ebbfecb5a6bace25b255d3379d9eb239943e49ec3ae4410b89941cc8a2f221a64ee8efb485f0b88d74f06e391621da0c6b85630a21194c084a4074b54da823d2294f2e2f6b48d4b077f9f6240a3328aa6f64978ff209a8b9717e2ff5f82e8f66aec54eec9db7f2c01933c8281723529d7d2fc69306a93e7a5b2bc81cc07eb34ac630370a551d2ef87dfa0c"}, {0xc0, 0x1bf, 0x9, "8f95483f1ec43da40dde3ef85914293a46809669c80b3d674a63ade176cedd68f01e0188bfe8de215a11199dce09cffff5665fb81964174cfed1b7b89ce6b688c6b7fa9ac3ed6bad4846d5242f3ba15ba29cdad07831414e57fc2a4103c92bf92a69ce1fb7f0804103fd5688095b1e4d1ae38db75de0b8954eba81a96c2b84b7e9a76ee94753c2ad1b6f2c9334342439dbdf2fe45e82e811b8ab6f757589379432eb48cdbfe2a284eb11fe6d9a86"}, {0x48, 0x0, 0x80000001, "1e4cea61adc2776d3c411da06b4601b7dc7c2565c9c91058d2fe80a62346c6350f3c8f2fdc742316c1d86cef9033e09eeb"}, {0x80, 0x10f, 0x1f, "ecb0e4240f55ce9bc7274b9ccacec550cb001ebf650a09fa241b806cb0319a96bc9f23b1ecba3d4e5a64ade9aea369df3f6e62ef7ac6526eaec91d4a70dcf525471b3be124473aff5fbd881974d05c763d3a66251b82efdb045f66111786ea1d3cadf2b9ece1bd114fb1233ccb33"}], 0x278}, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000580)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x191}], 0x10000208, 0x0, 0xffffffffffffff25}, 0x10000000fffffc) [ 1595.187171] hfsplus: unable to find HFS+ superblock 03:42:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'lapb0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:42:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x480}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:42:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x2001, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000740)=@ax25, 0xfffffffffffffe9a, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x97}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f00000007c0)="7ef015ac2b521effb3a200791e6bd303d0b9b96dc8a11e5c5b48d6da0ba629da3911c857d2a3ad776146ab2b8a728df83b194e134796ef3aab98530d75cf1c55f236b52b50768f0471d5e66ad20f9ed8226bcf74f78c491e72e65fd839a9b8e652788faaf858ef2bf8942904c6cb2f82bc808b6a898dedeb2347b6a32c0f5c41ced3decd6e830b55b16cc6663636f6a737dd98dff0f2e4ff50939a8ebd4fc65e6dca324d99daedad7b8f518d0a15fb649f2b354cba16aa74f4f7f9f461634dff53f4a3579640ee704f862d6b9b9c32b05a31"}, {&(0x7f00000006c0)="032d625d6b7cf9687c14b0a2a043356e81e9627b1ea683ceea671d6c9841e399756903f029"}, {&(0x7f00000008c0)="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"}, {&(0x7f00000018c0)="68067229034062f4fb5d82f4ed80980d4ace507e20c477b4264ff7f731e7018d37a76ae30d83fc84182e07e2db2ce958cc145b038e48ed60e1e6b059da3e87f3609e71c595d45af301d90326bda25b9a97f3c2a32d35cd56aaad28d5"}, {&(0x7f0000001940)="653b64498f4d1a3f8abf2190ee122185616d7f19916580c37144845b3332ec5b80d602fe305aba9b385bcf8dcc8b8b7569d1f54183e907e0a763cdd92144dcfd7326105372e5a15a02487a9db9fd9e4be70dcaf75a510204ef50639bd66d9c4cbaee692d4daaa25f523d08af08627041574daf9806653ae836a6f6d06d0d7f4e6f6ebd769f3d23699367ccacd3813c085241fce2d5e6cec3af87c98d482d1ce8b11ae6a25b62c772828a3a35f36d0bfa2bee234fb0affeb644175ceb401d1d07333d5f3b4b0f1015e9e71cfb9e32c9f68531d7719d01a4a5ad729966aad7ef4ca759d8e2e1032895137b2f576ff4d5899f50420203"}, {&(0x7f0000001a40)="242894940cad48ffaf597be514be50200c55637a9bcc8935ec411dbc205d9aa75f642f167f1d17f4719370827ea53071f4af74e1aeac4c3ad0906759140cd74ef0688f041ed2599c93fba9a45b0241610022a59b366f651cd261bca70920dfa5e90dbefc25da347639369bf4d540c9246721cb487946f0e192f03344f1099f810a8934e656c899b6cdcac44e58b4a2"}, {&(0x7f0000001b00)="69e0478f115c3fdbec88f6a83a1176fbcb35aa1d693e3235ea7b55a5a15d70de469fe32ca6c0910f9e6fa1239132e9032286f9995f895b37e4c7a355e39339d874f7415fc27960a9cdb548d0e9f39c2fad7900da617b0438c3469c5bee16a51aea"}, {&(0x7f0000001b80)="94013a7d13957095e847de17e3d5521ba532f1a5c26b05433b0c8b81ab88818c46564a7daaf906d83504465b4c5aac83cd176d94ac00c9a3591fbf8d6c12f2ac0670c186ef7410c6939052db60cdbbed333f9b6f", 0x1f4}], 0x3da, &(0x7f0000000400)}, 0x8000000000000000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e20, 0x4, 0x4e22, 0x0, 0xa, 0x20, 0x80, 0x0, 0x0, r3}, {0x80000001, 0x100000000, 0x80000001, 0x2f, 0x3, 0x400, 0x539d4772, 0x6}, {0x100000001, 0x7, 0x6, 0x7fffffff}, 0x3f, 0x6e6bbe, 0x2, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x22}, 0x4d4, 0x7d}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3501, 0x4, 0x1, 0x0, 0x2, 0x6, 0x1}}, 0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) 03:42:57 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000000c0)=""/122) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) 03:42:58 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x2, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x44080, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000000c0)={0x2, 0xb87, 0x5, 0x6c076d82, 0x0, 0xcc9, 0x9}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa0000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xbc, r2, 0x600, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8e56}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40040}, 0x40840) 03:42:58 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_create1(0x80000) io_setup(0x101, &(0x7f0000000000)=0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vga_arbiter\x00', 0x2288440, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x10002, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x6, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dsp\x00', 0x64b00, 0x0) io_submit(r1, 0x6, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000100)="296102494be2e3b9d09f54d8d84e90c73814a8ea73c78fea7360b7dc4538ebea308aa1612c131e7583c683740d5ba0b0576cd207295d5405776b6df9e512ca6e93457c9694864df77e267db270b75cc7dccd31e6afad3f11b38b7b861bb2873e9e9f0a2255ce31bbe8f6e2a7b33c4c4e23d586bfcc915b42096e61af26d16d75eea31d2f87629c0fc9f20bb76d1d83f10e65076315ec8141df7655b789bafc31c790852eaec03f47a159a5bfe7c303b282ee473f7e6a2dcc8b0ae1922f51aea92db4545a942f9787912b3e7023fa", 0xce, 0x4a0, 0x0, 0x3, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000240)="7122a20e9fd08927977c5651202a11c2a79432f59764285da71a08f8a9a2f89b05d741ab8f6ed399a07113890a97c6bf24e61132e71b7c18d95c0df6ae9377c18b2b45e5d7ce861a107be9a348dd0f4257a780e32419303e94d56830b642dd35e79af00d94d03c66037c55c52a1b274be3a11f6dbe907032663a5c1545eba3ee353e0ea95e18245f5dfa3a835dc67e7658ada0feb159c48e3286c753af1f3fc3168eec593b14f7be047e553382a37eb8bd8d3c5d17623034d13c2ad781b3d179b355d9d6654310dab9bf2b608cf3533c7f4f5601764023b4402d876872e4e0d1b153187f39fcd67e0cff44eb71068a60e0d5ff6dca", 0xf5, 0x8, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000380)="367753cc1c9ec4465f14272af021622b6d876c8f7c8eb362e340b84121bb29b75d9f445af867e1e9ac48a58147b0f73fb6f8b5f0c54f5e11aa1884c09b164eb6c1d956abd83b2467e1da981628e93adceced94bff2fc2746d5bcfd68c005cce9101a2a0a6c1f5bfba7eada0828503406f727572e46c1", 0x76, 0x8, 0x0, 0x2, r3}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f0000000480)="6ed6d31db0221120550f53f9395ecc7ed4ca1a68e057c77ffca31d5f55d771b073a5841f04ca9f7d83f412b1964d452cbbbdc33b858b147d4fa86248901455f04c494261b9e45da6a54f938ecb88d0621391ca6e36c3b6d3afd390c91a1fc7caa7822ea52cb2731d09d8c591f852fa6d5c7d3a4f5340a7cf247b02cb910c8264a430ef85cf382120ba7eb95679b7c16008040d78aedfdea1246abfff6550651305f3d8d61391411c63513d844037c379d0fc874e70182d5ccfc200b8cb534b1cfbdd3207b164bfada53f8c", 0xcb, 0x1, 0x0, 0x0, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, r0, &(0x7f0000000600)="532cd2994fbf5de4c56defb554c29530d3233992824a", 0x16, 0x1, 0x0, 0x3, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f00000006c0)="7b7d235551931242af75fd06b7e00a579c3a3c7a6bca662253a9ea71788a2cbf0e0e8bae9dec47f4bb7e728f2d6ca342ae0b4be7f0ffea06822e81bb510406126d99d88557e4df", 0x47, 0x4, 0x0, 0x0, r7}]) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e0000000700e110d0ad136a5e0001002d00000000"], 0xe) 03:42:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x500}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1596.893177] XFS (loop1): Invalid superblock magic number [ 1597.510206] Unknown ioctl 21376 03:42:59 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x10000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x80, 0x1, 0x0, "1eb3cd9e0db1f82b0186cf520fb8bcb67334c241f0ce9e98f897945ad98a96de"}) 03:42:59 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1bc0000000000, 0x500) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0xa9, 0x8000, 0xfffffffffffff238, 0x0, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000140)=0x84) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000280)=0x200, 0x4) [ 1597.789051] Unknown ioctl 21376 03:42:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0xfffffffffffffd3a) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) clock_gettime(0x0, &(0x7f0000003200)={0x0, 0x0}) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) recvmmsg(r0, &(0x7f00000030c0)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/227, 0xe3}, {&(0x7f0000000280)=""/218, 0xda}, {&(0x7f0000000380)=""/149, 0x95}, {&(0x7f0000000440)=""/89, 0x59}, {&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f00000004c0)=""/135, 0x87}, {&(0x7f0000000580)=""/82, 0x52}, {&(0x7f0000000080)}, {&(0x7f0000000600)=""/96, 0x60}, {&(0x7f0000000680)=""/78, 0x4e}], 0xa, &(0x7f00000007c0)=""/204, 0xcc}, 0xfffffffffffffffc}, {{&(0x7f00000008c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/72, 0x48}, {&(0x7f00000019c0)=""/238, 0xee}, {&(0x7f0000001ac0)=""/74, 0x4a}], 0x4, &(0x7f0000001b80)=""/127, 0x7f}, 0x7ff}, {{&(0x7f0000001c00)=@ipx, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001c80)=""/52, 0x34}, {&(0x7f0000001cc0)=""/45, 0x2d}], 0x2, &(0x7f0000001d40)=""/49, 0x31}, 0x7fffffff}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/11, 0xb}], 0x2, &(0x7f0000001ec0)=""/4096, 0x1000}, 0x3}, {{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000002ec0)=""/212, 0xd4}], 0x1, &(0x7f0000003000)=""/179, 0xb3}, 0x10001}], 0x5, 0x2, &(0x7f0000003240)={r1, r2+30000000}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000003280)={0x0, 0x1, 0xb9, 0x71c, 0x0, 0x2d00000000, 0x1000, 0x5, {0x0, @in={{0x2, 0x4e23, @local}}, 0x10000, 0x7, 0x4, 0x6, 0x8}}, &(0x7f0000003340)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000003380)={r5, 0x47, "b4095a9642b3a9f9ac4ee4bb8c292f794b5572a04f06782a0c4f8ba4d007efffd6647142042b59c30f18fc575b1f93d4d48dc8dc5e50e51acaafa055a62984956ba2acf417fad1"}, &(0x7f0000003400)=0x4f) 03:42:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) clone(0x1020000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x200000000000249) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x3, 0x40) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffffffffff47, 0x80203) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000140)) close(r1) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)=0x3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000380)=@add_del={0x2, &(0x7f0000000340)='veth1_to_team\x00'}) ioctl$void(r0, 0xc0045c79) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = semget(0x1, 0x3, 0x2) semtimedop(r5, &(0x7f0000000240)=[{0x4, 0x5, 0x1000}, {0x2, 0x6, 0x800}, {0x1, 0x10000, 0x800}], 0x3, &(0x7f00000002c0)) [ 1598.174230] kauditd_printk_skb: 191 callbacks suppressed [ 1598.174243] audit: type=1400 audit(2000000579.753:32524): avc: denied { map_create } for pid=1205 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x600}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1598.375549] audit: type=1400 audit(2000000579.783:32525): avc: denied { map_read map_write } for pid=1205 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1598.587369] audit: type=1400 audit(2000000580.173:32526): avc: denied { map } for pid=1212 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1598.691884] audit: type=1400 audit(2000000580.173:32527): avc: denied { map } for pid=1212 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000500)) r1 = socket$inet6(0xa, 0x7, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10004080}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="000326bd7004fbdbdf25100000000c0002000800070000000000080006000000000008010400ffffffff0800"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 1598.846368] audit: type=1400 audit(2000000580.173:32528): avc: denied { map } for pid=1212 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:00 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x8000000006, 0x0, 0x0, 0xb92}]}, 0x10) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8001}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000280)={r5, 0x68, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0xec, @rand_addr="2d333aadbc573ba611fc53b7806033b4", 0x8}, @in6={0xa, 0x4e22, 0x3, @remote, 0x4}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e23, @local}]}, &(0x7f00000002c0)=0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:43:00 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe1f, &(0x7f0000000100)=[{&(0x7f00000001c0)="f9a1140956a27035599ee63739feeeb2554d38268ff4d46c5a0ee377577951e08020bd71ce2c5faaa1ed63236c5474331ff6c36a58d7161b81464694cbed3d1df4224718e1c6fe1b85f5f255283ac508df23a30e06c4e1ea2f767e5439ffcfa5faa3951be001a8e92d9f00ec065b726fa1ced0ab7b6dfd607abad840892e5ab1c39e62b5c1e7752bd7d37c8c7dfb1d75e484e4470ab6fd4cded389728aa3efae6ec1873a3d0d20227c2c7f343f7fe01e745d7df0d19d639b05dc3d5bc8f7943f2c"}, {&(0x7f00000002c0)="7e02115d7708aaee4c1f9e2df4ed624e7d92a78b34329536e873a6473c133ba73982e8f7fe02b5d5e6262f062a7647f041a36ff31c8dece98a1843e59511ca99aa533c4040e233123af8ea71ab16dec2fc0f8e52f26aed985a75c921dfef795df48ea664aa4781b1828b4191cca8bfaf0b961d1dccd4eb3dd34637e72d4cd8e657f226a8e89fa451c8924c1a4492cba14340fa6dc61b"}], 0x1000000000000216, 0x0, 0x612}, 0x0) [ 1599.000715] audit: type=1400 audit(2000000580.173:32529): avc: denied { map } for pid=1212 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.125491] audit: type=1400 audit(2000000580.204:32530): avc: denied { create } for pid=1211 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1599.267920] audit: type=1400 audit(2000000580.234:32531): avc: denied { write } for pid=1211 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1599.445579] audit: type=1400 audit(2000000580.244:32532): avc: denied { map } for pid=1213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.597125] audit: type=1400 audit(2000000580.244:32533): avc: denied { map } for pid=1213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x700}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x280800, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80008}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="0000e400", @ANYRES16=r2, @ANYBLOB="040228bd7000fddbdf2510000000b0000500340002000800040002000000080002003f0000000800020007000000080001000b00000008000100000000000800020001010000140002000800020007000000080001001e0000002c000200080003000200000008000300ff0f000008000300010000000800030047b5000008000400000000000c00020008000400390700002c000200080001000a000000080001000c00000008000400090000000800020009000000080001000c0000002400090008000200ffffffff08000100e9090000080001000700000008000100ff7f0000"], 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x5c, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e0000000700000100eb00000000"], 0xe) 03:43:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000004c0), 0x0) socketpair(0x9, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5cc172050605788bf3e45d77630ac1dd4eafdbb7d01c510c75f3cca890cbbfcd95211dca263cd229543bced28ac7f8ebddcc2babc6a1730020ed047077f9953f6cde35d3cc7ed1fe3267664a79c0956cc1d372fb8a405fe73ff7387f4d3eec4919ed", 0xffffffffffffff49) recvmmsg(0xffffffffffffffff, &(0x7f0000003180)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001940)=""/4096, 0x1000}], 0x1}, 0x3}], 0x1, 0x0, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) 03:43:01 executing program 2: r0 = socket$kcm(0x10, 0x800000000000001, 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$tipc(r1, &(0x7f00000015c0)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x1}}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000100)="fa785655e7d0d262e71c9cd127cd269c0c7e3b116b71d625b0f4b9cfe52dbcc584efff79389d92369c842d2f2db57f1039744d39c3837cedf531e33c8de14b3932", 0x41}, {&(0x7f00000001c0)="be74773e4370a9dc2f780cfccbcd8f6720301e966b62c04387dab169500a47b3fb80b7192b700d46fdc24ac614aee601365241175a71bf7ccd06738ec4a57790fe48fd1d18c50dcb253b3a6bb7105e6facc19292a2af80fab678abaaf8d6ea0ce97fd2", 0x63}, {&(0x7f0000000240)="070815432dd69c748a24b25445bc599c2144b475530bac520c4c95b215e748ebf334bcb538fae7f22b478d2be0582f5dfdebdcdebb7954572a8ff2dfe40117bee9311d30c61cc01f9bc913562d58ed32b4d344cb5e2cdc5deb14375ed70539187fb55e6fa174bf4fb255248ccb76f803fc9d7911fbc69df8849683db13a5f55c7026cc45a8769dc5782ed3ea613098", 0x8f}, {&(0x7f0000000300)="a4588c538cc6f24956386701d23c3c9a3adabf1e", 0x14}, {&(0x7f0000000340)="c6536de238c57dadb7fd52f5387c000c0e473ea47b135b335ea722e08ea6abd33e473aad", 0x24}, {&(0x7f0000000380)="ef10585a39527003fa059f63462f79a8ef5123593ba524fa8dea3746841058bfff8fb31d3a3d208cf7849fb2eb08da92f1246aa9953997e161024fcf15e43e26395b4456840f0aaeaf820e24005c9a1b9831d30768bdf845ad8115b7920460a5df82da21607f7c9875b7891ff88818de689409faaa8f65912a71c7da0c30d9fe16db57c51966c112e72d152e9ac0248f75f4cdb1917aff2a04ecd4d26e9c6a7900c8934b731c478d8afdb55cfeb6a6b78130b706022e85d777315a8f2e66364f63", 0xc1}, {&(0x7f0000000480)="bf3346799bb16709907b03a598f6edda4294156739484039cf717ac3bac10c391cba9719f90c9725cfca55624fd58523ee01b7b71277801e645570cd2a188b63e7647da6240bdcda70490044f01cc5d86a73c7be3dbd881c513c605de57d336f926d3f485e4c5faf84c781029c2e08c01a060aaff418b4bd49566b9ad678fe1b12e643de945c8307e840554c6d371d8f1c98bdf1afe6d44f3b5ace5998653746952c62", 0xa3}, {&(0x7f0000000540)="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", 0x1000}], 0x8, 0x0, 0x0, 0x4}, 0x4000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) [ 1600.684353] protocol 88fb is buggy, dev hsr_slave_0 [ 1600.689462] protocol 88fb is buggy, dev hsr_slave_1 [ 1600.694351] protocol 88fb is buggy, dev hsr_slave_0 [ 1600.699556] protocol 88fb is buggy, dev hsr_slave_1 03:43:02 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x303000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x9, 0x0, r0}, 0x2c) close(r0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f00000000c0)={0x9, 0x1, 0x0, 0x0, 0xe10, 0x8, 0x1, 0x7f, 0x7fff, 0x0, 0x1, 0x3, 0x0, 0x0, 0x29d1, 0x80000001, 0x3, 0x9, 0x1}) syz_init_net_socket$ax25(0x3, 0x7, 0xcf) 03:43:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x1018}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1601.244123] protocol 88fb is buggy, dev hsr_slave_0 [ 1601.249305] protocol 88fb is buggy, dev hsr_slave_1 03:43:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400000, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0e0000000037ec836e4ab0345df313dd37348e7994020f18da43911c3d44b3acc45074f8e276bf93222e61f14cca66ae9af0daf2582ad030ce677195d0d2987d3dbf6c3ccd29e8570363da082a1494519b9524743b84bd35ca9872d5663b891e2260e6c985a07bf2cc10a3d4c3bb590cd4aeead85dee6635a07448b0d6e147114a01c3836c2df30a4e1281e479626e595b4e3034c35c107cf4999e6ec79ce3d7a53f7425937543744ec59915f3e21ae596a1caeec62710bbf2bc882856a9e4eacafbf10b3658eb93a7fa41fb36a1d2402a9ef10a39972ad104"], 0xe) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x9, 0x7fff, 0x7fff, 0x9, 0x6, 0xfffffffffffffbff, 0x59f5, 0x7, 0x8f8, 0x8, 0x1, 0x20, 0x2}, {0x7, 0xfaf, 0x7, 0xff, 0x1, 0x1, 0x3f, 0x4, 0x1, 0x2, 0x6, 0x6, 0x7}, {0x7fff, 0xd6fd, 0x0, 0x1, 0x1, 0x5f, 0x8000, 0x6, 0x0, 0x1, 0x2, 0x2dd, 0x30000000000000}]}) 03:43:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0xc00000000000007, &(0x7f00000000c0)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x3, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18, 0x0, 0x1, {0x48ec}}, 0x18) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:43:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x2, @addr=0x6}, 0x8, 0x9b54, 0xcf}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f00000000c0)=0x54) write$binfmt_aout(r0, &(0x7f0000001000)=ANY=[@ANYRES64], 0xffffff8a) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000240)) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000540), &(0x7f0000000580)=0x4) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x204008}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x68, r3, 0x400, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x8, @link='syz0\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0x8040) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000380)={{0x9, 0xcf}, 'port0\x00', 0x1, 0x40, 0xff, 0x3f, 0x9, 0x401, 0x200, 0x0, 0x6, 0x6e85}) 03:43:03 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x440, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x1, 0x1, 0x3, 0xb, 0x7, 0x10000}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x1) connect$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10) 03:43:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x1810}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x21, &(0x7f0000013e95), 0x4) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) close(r3) close(r1) 03:43:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="edffffff07000001002d0071b0df08d4f1"], 0xe) getsockname(r0, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0xfefa) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x5, {{0x2, 0x4e21, @multicast1}}}, 0x88) r2 = shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) shmat(r2, &(0x7f0000ffd000/0x2000)=nil, 0x1000) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {r3, r4/1000+10000}}) r5 = getpgrp(0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) clone(0x40000, &(0x7f00000003c0)="bd2060ae589b07559cc501094e51318ac6e84fc5aa6a12a3bf7215e591118f7f1271691e74f29eb82dffc627992a684159de2003535f601806675155add608d6d2288c97e9f15ecde1c6f3598a049de37963ac5fd5bfdf0e076a07512bdb", &(0x7f0000000040), &(0x7f0000000440), &(0x7f0000000480)="9cda379f2309e0d06ad7f248498ca9d921d5a3a64b42349dec5d8d64428e087a05041dd05b9ccc0bc0521356ca2adc9918da76f9bdd17c25544be9cba86a2d3639c3edb2a1536ef66633ecd4cb290684d4e896af94e59ad46dd86d61dec3b478a07f10137bd93e51bac62c46c252aaf0a135da8af9accf2dba296cd837595a2371f7db1276bc216c90c9d7578a8361a9c09e123deeceb309fb9da2681db22b7af736e4ee15014c2e7bf902a3fdef4a57a6bf46679f767da35d569550219a188120cef8888998aeba79") getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) ioctl$VHOST_GET_VRING_ENDIAN(r6, 0x4008af14, &(0x7f0000000100)={0x2, 0x5}) socket$bt_rfcomm(0x1f, 0x1, 0x3) getpgrp(r5) 03:43:04 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./fi.e1\x8c', 0x0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = accept4(r1, &(0x7f00000001c0)=@l2, &(0x7f0000000240)=0x80, 0x800) r3 = fanotify_init(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], &(0x7f0000000300)='ppp0\x00', 0x5, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(0xffffffffffffffff, 0x1, 0x3, 0x5) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x100000000080005, 0x3) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty={[0x8000a0ffffffff]}}, 0x1c) listen(r4, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0xff, &(0x7f00000000c0)=0x6, 0x4) getpeername(r1, &(0x7f0000000100)=@ax25={{0x3, @default}, [@bcast, @remote, @rose, @rose, @remote, @bcast, @default, @netrom]}, &(0x7f0000000280)=0x80) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) fanotify_mark(r3, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)='./fi.e1\x8c\x00') creat(&(0x7f0000000040)='./fi.e1\x8c\x00', 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000680), 0x0) 03:43:04 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000e0000001000034000030000b4000000d1bd000000000000000000000000", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e23, 0x4}}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000001c0)="d3b63a2334f4547086f7dfa38188bea4dc2b327deff8c0671638a06d4a706b0bf446f79eaf41d80dd0142c15199d868c61460f34416e3cd6556a0e1b26788f8d172a7715630e4cc958318cec2f4741420a0fb7a46f816f79ceb999201b1d564d92dea9e9033ca60e76d3f1a7c86c8b7fe09e1d168db24478cd202e7ec703a9de54fe8cf885435fc04ee64adf19e75f7d268084edfea8108ee68d76ae9591d2b7acd5af779b4c8ed8a4338a843f42b0085cc811aa301f8874912518393a508d7d4fa070821fcceb7bd84f8772b1fdb5d7c869cb91b4f41a0f5fa36be05d745c5d", 0xe0}, {&(0x7f0000001a00)="cb68e14a80b3bc606a85880fbbfcc9f1443d754eef2e76bed758ae8176383d4515f5d57ef767bec5f2a8d48a7de0f05057b63f477b7cf2da140f78d8f4d3c0557080d401b92b5a47ae814e390faa3160c733f36e06219bf075cb633078f1f63efef0681b104d445ee3192802d471287f25d18dd04663d7862d3e1e7bd597d74a2bf3d4174b2be54ea1f003908f72fc61c57922577ac5199122251da35d563f6f3f81d6398652df74772831291b8f50c103c5736a370f1d9be65ac30ca31ced36b3ed3ab0d51c90e7486ef44f08a3c33455161cce1d40125b", 0xd8}, {&(0x7f00000003c0)="7a233da615137cdadcbf2aa6345aa228ffe7b71b512b8ca8d65db6a4d9358a99fe3b94dba33194db0744e682a12b8048b823aea3c0f6400d228529bcf4c3215860d069e584803bc7682e1f4c8d29097d47d37170955ae084833efa7090ed38551871f49ad86f343d4cfb625e3e11349f9d9c993bb201cdea0d44d4015ff440ba296d6cb9b98734db6038d75528f24f78e327aa93854b33b4d9ccbb1c3a8b87d409d58bac4bb41a26fe573e437b08b6fcc25801c9543a24b4", 0xb8}, {&(0x7f0000000480)="cb5299115b0f85d6699b1006512f288ff22fabc0abaa05a46674b0aebdad8ff161fb9aefb8bf404606652412123cc3699c0aca2d9b0617b3d392a5345cb37f8fb5b10365c441e2e64cad3892bc2b44f031ba24c49c385ac25bbca2c6c053a9e05925fb5e4b0754e54314d76fec6925430183f31cea1725bc18c8a2daa56aedd25c3036bd", 0x84}, {&(0x7f0000000540)="f85e1a5b42cfe6c7b9b3403306d160bc987a90b59fc43cfa543785c87997fb9673e1f3b426cc005c8d82e242eaed2de0dabf2c8d634e4dab9fce3e9c8690fda6ab71071be3186bc101356be47d4f7625375efef6fd82ca8eae952d80a0d1ee1c65f0a87b21", 0x65}, {&(0x7f00000005c0)="8b800ee3601152e9c6db0401f361a17a4a18578a818ef19618563ad40e256d6887cb79d3e74b6bb9b63730ce04755851c37f67fa0ff0249cfce3646419c9cefad34f4414c3f28c3168c62c37b2e258a09befc948e8a8719eeefdff857a4ca8de64dd56a106f554b4df4712265bea37f15e8254e04268f98f9a319a3e79ff47a58954d04d2d876796a4a747d94ada237942dee7ddb6298e3312f3cbb6dc8b7a867db9a59f2b0c5aa3292cb4317811ec26d9150b51ec80f59d62ad8d0d907c8366a0889128f0797eb2b2c50d7f5dfd29b60066b86ddce929c1bb7ef0c1686b92332e40fabee43fb3ab4a6c684828059d947ef5f88d3cdd20df0bbbde3abe66b1e9da3cbf37fee8a45f8dfa4a8900a4f0a7b01b6d4738788346849e4b383f405c04d9892a8c291f2b8ad2cb5807bf1b6a4269e7c0b98e10b9d8736fbf65aa64ae2fa7ec72b772f218cf2f812f9819f29689160edbcbe9ccc718ddb37b465db13a96e316f78044ab0072684338233ab6792caab77668fd157b2b1d7a5818778b12c6e38d2e148bed6d9ef50ee248fb268e390684efc005ecc8ae9d0acc59ec879e8c154ca81479bd404207a4990012900a093c2fbc0b646def41f0d66546eea455dd589439d0ed25dbb8f81f5054cde32563c0c683ef73f8cd64f6c69d7d6bc7226cb88459d557f30ee6d98320cb66d35864905f77b710e5a4ab0a65c7ab170fcc5748be29ff5e9d99b95a9b707efefa600521600438cef97f184180af715500007d29935e583565585e05b02baf868cebfbd21725b11c27c6d7fcdae73b202add6b77d4cc3d090436f0367266bce774f25cc5d46d1388610f7dbfd8fd504ac633210924f13bdc3bb68ef3e1b56ea8fe2b85af3ba0790e364119c9a2184648a81e01f7238b5eb468cf31634e485c8ed0dcd6464b883d04b08969815a73fb12c92062884b98b2b2921d3074c9417e3c44273a7cdf9591bdeb5c2f40062a144cba6e6fe793d0c301b921ce8802fdc0302595b45fac747c38e7b475e9935dc9531589aeb89113b176db8f720c3da0e7588f40654b9f6110fee62621d9a539fd56e15ad61e35fea2c46b88ced8be973fbc0435a66c5310167f543afc66e8a800fb8161018db388f5b14dac31dd4fff0d6f7fb701e4e2003a415e2713dcf672941a18bf193ccdd60af0cfd2104364221040bebf5b617061091a2ae341ac15ad2422995ecd99840c6cfb2cc19c780a62fef53a6de43d766c2ab360813a2d3e19f4ae0402050edac7ca983ac014e521aad862b3ea87e8b8dd196e6d4143a122b4f2c13cff83c2b802fb301d7fb8ebb0f28deea85237706416827f7aabfae4ef109e2f77db0a50745fda3dbd5ec473782965cbc6e719275efcced97ce43f48e11b754b43ec79428dc00069a685aa84ccdc59f0e24e9033a752199d3e892c7cd8968d6ef61b56b2f4b3dbce3f282ec673a64c8d60ea9605db406310b3ac78a43d0585e412e18e3ba623fe3b5b0c331cb63c76e421e521c711a2fcee7fb1a2f87acc6ad492ec6f853eb7582d4f450097fdc1d868737d5079b384e7ef947bdd760b103a1f0d15071a8b70c0a6b4e33edc1d94ab1e839e802d9ebcda657a44031c287cb7fef5b897779bcea18f0cbe86eb59ee9f819a00d51c348be3f15e11bceecc5dca033f1f625cb4f5e71ea45e77b607de9b67b499c45830cb8b5c3f9a3f91e9013d5322ca5b5c62a0f3bd35099edc9a5eb89d5bfc8b45f1ed6e107fd727668cbe720ee9c8df3cb2bcb037a8ad478e913eaa45271932c5cacac5b1f20f0705f8c7ee221045d7dbcc5a04acbb6ffef6bd57d3d196309835488570c62a6f6834f087f307fcd0d229d69e411c3181357ba2fd35ab7ac6403ab0225ce6efd1f6c779808f8b6dd09db3dbc219d77df1bedf996225f914f7370fe74eb63f54711ea6d1fa18b9c2499c85775648527862539b0d4bcd3e54b3815b2ba1f015e0b04926851d8f2d80842c33b5946e2711ac22521b35eb37b6f79d7978d61000b61f9b7d5eed08b840b43ca2f33e7cb2c46f552110dc9d88c29b81d3bebd101102e50a8c632c0135c6813348649cc7b81ddb134af3e7f677c00607d2c88c53533e7036ddf58f0dbda0600a660cbb85a8d093bc4910642026f971b0971acc2b1d78ec4f694284ffe644abdcebc8c5fae230abfbb7f785b6977547b53bf14ed97f57b654ed065c864aada0810c9422c22e24eee2e15e5652baee15f73025a577bd0071ca169717487997f309cefbb08b026c9955c2a3d27072d9fd034505f4605861a96e967626d11b156baa2bc3c21cf5678237914d1d8878a4584f77c6da66fcfff10790a1932fdf1fe2ef287f29dc4b2214cd0062fb02b012a24c3dd6b282edd9b3a59d1f860a7d23267cdb30d1036045b7b7993f36567c36902df027da2e102ea1e560324bfbab9dc9b50c437f63c5f440c227200e4b84d346afd1043e0242fc20f73bc6abe6ec30587ea3a1691b6011c45c8fcb9510a8bd757d3ef1f0ade4ba8d8188a6da6760455bce658c01eacf7cf0a25748deebb48008030cb653223a7d703ce5b834d8d862d1a417dbe40b0e88f692ef4cbff9e24639e672f9023241054c546e9fd0643c82ce52aaecd6dc206b48ff5b54415c7092cab9d398c0617d12739f4d8a92f581b7b1d9cf9f0aa11bc85fa02bed4af8674cada0f2b133894765d0b72819402584497782261608f7987e356ca98dd73fa9a6601d9f4adb0fcc1c18db4681f2877080b0552700ef89ffdf97933f0044801f755b356329e61058d1645e889357f018c5d216a546702da673813df3abff89505f1f25e0ae339444753e664745b03ccb09ff796565726613ef1f731371b2e29ce3cdd1f779b16ad280ad42ba7dd44e515cfa18717d6ea372530faf9264446229fbc62e8d239d13edb5867c05844913b235b35067a87d0b3f1591bb30ccafac99de6aa36ca42f38497fbed3887f5a7c9943519ff32e7fab03d5c19664d3c0f65dae32656c7717f4550cbbb242e05428a11b6eb5829993a392290d2b96d340296ac96decca1d7889f8d21d4da7887494a608ceb935157462ae3547b1157e6bfb149941a7a8cb8ec6f709484c04c1d650d79daf2e184fd5dd7b6672db7e19f265606e83f55a1c6048eaa94d2e0a66d160958a2086f82646dc78db09f6aba61cd09571154add80ac6c2d987b11df86dadea9334e47a40a8b7eb659423fc94347604e6d553d4f17e86040c794bd93997b3006c360a902c87d12af8a374681f1d35084e28aea404bab7fd1143870e1de60ef00f3b1d3720c8662072d78ad9d14cfcee7f8e58555a5aac008600dcc82dbb39bddf15d0d45d6c08f4a0edb4e9f1e90023a0fc18f91e3dc63659157493d3e3a203cb97c98f26d62e77045ae12fa20cb08a8a91e7b6cd6bbcd210365f3e4cbab198c3b6d85c8af288712ee650d99668256dbdfee41b33847b667fa89b651e6e3a87de2ebeb947ea8ae314009a4a0451d46e2a15683c7d9b153f0ef05c065110e731c1247529564bd7c114a49791b545f39ad432a13382cb08d414992310feccca0190cf33b60e57744ea6204259fb6c584850950ed92801a579bcf3489c1bbcab7e0ffc37d3e3fa1e73fd75ad4bdd7199aa561f8c3d2e9d9d6e313e8c0dad8e2eb1657f92f31b07952f252522b1ce068b04f20189282a5a1cbd84693c0f24e509ad7e7724aebc80cbeaf28d4213d34be507eabc25487f7409210f75096cb746ce15f3528320dff874eb67540e9ae81a1641c03e80abb8f804f9df6c2b49644347e3e5cfa8524eae2fbe3b2be96bf937844f8f6dfd929f8e77106d1c2ed8cf3e31b9a2c7fe26f32e34b8b2990ee8911dd4056b0485863ab72fdbaedf24b84f56dbe625157d91d5a7d437cfd1a9c93a63b793c8afe116f0deeb54f2f97f00190e806417bfd5f28ac8e5ec389faa8b07be8e03a5ab49b07eeab6f4e33ae08e676069c213537693d675d96bd0eaab3a3b3202b2664f51d9a9f888c908c06643b8f38af24c6e8f0ea19c552b1ed099466f6a8775c2ca1d6b0de1ca6ea6e6431b2f6bf11e39d68bd9d0d2458241b865d033aae9f082d24c161d3284c8643e567bab964c413de54c51d0509f01d473dd2879ec5f1c4e920687eb97e5862efe522c70e71a257cdd75a1642f2887c15a360c866121b7623e2502bceaaea5cf17f4071732e5635550324b0e9883180e21f610c1df51e2b5bbc10c64c9648dce273cd2dc3311af9d3483ac5c593e2436900ed6c50fe156880ccc3afd9289e47e2f1fe673fbfc7b4aa0fc7c0989500a4b43c315783e7c3e630bcb1976f62f6584d404c8f942365c326464919af9cddaf57d74f4e04bde93e78b8fe43eebb4d85c2ce0fc4b1263d3d6db68a82571c99d6da0522b99ac8e5f24fd9201d9aa7079b441e19813297c284506801bb27230709ef9404e7777b441b348bfa3db765c02759a44719cef28f9ecbab630102bb6724e118a23fd4530a260ba227aef6dbed03060718aa698adb48bd195118f70c71abb41b01022fbfc0c270605900b70ecacf10d696ae1801ea02e86ece18378d59133012bd7530c3ad01f8a98b1bf07c9828d078ead679ff5554548dc90f4d9a4dbd1dcc224fcf284d1de1dd04ca461430d8051d9731a0ce3c726305f0ad91d50b510578b091e083b7bd938339bfa80a9cd266a1c9243b9f81f065132ce37bbbee1fe93bc95d6cd479160b7ea9f58cad57caa2a25c45bbc31f3a9551d659c032374ba05e62b5ff2b63c73c7f2698700d6bc86dca06b2a1a00a61f0ae01cdabf86a9196edcf946913d21c39eb6fef6696713bb7f87b7aee149c79529dc8629b4e23ced20c48fa3af918f394e94502898e4cf42a465332778478d00efc8d4174488dda0d9a6e0e53e1e607e993c92f359ef6e010e5cef8c241a25e2a2efd67241032e5556dd9d05cb7091727aad0a24184139df898cc76d9f5d68c55bdc69125e099df66a200889b6ac33e74bc0b828ea6fd3da33f9430c1717f1bf43cf346bcce91467c65e5fd43bc456054b331bf577c31fcd046ea24c036b90cc1b8332247d98a7ef1c8aee61a59cbddac75d9787ac398d093b7698d8f86ce4c5f46446e886ef0c1ca8f0eac43d12c9f065800af815e7a1a3c9ec6a175c6df0dd70340bf2d71b11f049e228a9965863b1da146712fa251b8d1e27c63b7cfd6f86382051f8c4346c81307477f38d752143251e0b71de9d3e59de2d1fa21773685aa1e6b9d1e236526f94dffeefa5c77c7a92f1927e87ce4d2f9261ca1a61666376feb4ef0523da7e67414cd4573065cd6e9256bb4cce5378c8a9d86a7c3ec56d5c28aabd25da9a8f4b59bd7a1c9e31be22f7d6cbd6c12e4a0e77e4d6a1377b38057c6d5038eff52b258a442c3f08234f07b4e3cab54869ea21c1214fefe2dbf2dcf23cb694cb18f620e8dbb1ae76e38b1b64cd4249fdf025af7db9e27e56fad1f6b75852713c781b59cb50738b5dca4b02a63108a83b947f5de61c1af7b80438fa5f70691848db08092ed30a7242c84739110c3e8c9ca4318c1cec35d291b55ec4e4a85c22c1dc23af49a40e93831e5e2770c7791cce40ee86b6f4c02435711e76508aba1ea55357444ff98d125843f7304d1b7dcaa89ebd3f100ffa08e05be6776abfcc520530d7abfc8bb86b47832a023dfdbb587c4785fdfef8fbb5a1080af74b2880703efb30a99d298c1a1dbdfeabf088d3561a99dd33a08cd4e2541b42adfbcbee106faecf13a558ca14bfa7e9d1421f50ba185df6297269d050592e15e1e78b5", 0x1000}], 0xb3, &(0x7f0000001640)=[{0xe8, 0x82, 0x20, "9fc50ded604e88fadb03950fbdfa8d6f7dddf90539bf68fdf8643991a8ae22db77f814ce100424f531e6c8aa35f898ed1eaacd5915ffc35bc45f056cc0e19842d6b65e0db68a80c67c11f0dede39452bc5330ac1534935e06fb4deb7f4f8026228c3ff85c4ee55f15d28cf70077e4428bb7b0000bca5d8787a1c90d46ff6184065b82c00646f72120ba10d97049216764590e44e5ca9f071138a99061541dc08bd1c2c68710bde5d3c2c72558b70962228fe67f9cd8c8b66266fc792ac24b200556aa6f0d6d551ec6accb938d8618a092ba5ab58c7d09720"}, {0xb8, 0xff, 0x100, "5deacde51857f732b7b231ee8862124848486c5377656c110c6169ca848a2d8246f413f691979ea75d0dde0872847222b696540323d17ccd792ba02a0adb3a4a0be9d9a7e64b6277b0442906e8b17a871320c25dc938f4d64bde2574e729caff53f7b81bd670c35d332ceeb0bc0e3f030f9c19990e8297f95f168fef92ffe9d2eac3ae40107e96994e65136478e850d6c6077a8b0bf995deac14b8a8a83946ffb947b2833a3a"}, {0x108, 0x0, 0x0, "3dbab0e4026043b3c6391c782427392d5aaf91756abe3571b4b55c0290268e7f49492aacff799d2565a43a6ee8a29abacb4c07b6f7fbb329b21fa4948abbabf654fb264b1a50843bf23e784b665bc0075035449ac19820da85ce69037f0956be05fa6a658daed3ddacabea5254ce6318990cc1a74b430720c7218c11de7d0c923072f9feadc929583f833df79d10ffbad3cc546a8f0cf11fa20f2d557fe6c9bc4145f8da14fc73ecae712fe13d27debc1b0cf3835a84673dfa692c3d44ed9d8a8686c0ebc812bae179667813c74f811b2d635d2513751118a6b759a4fe6c70f9ee0baa2cac3975b82742fc87efdb70fc1ee7cb2c70bcf1"}], 0x2a8}, 0x40000c0) [ 1603.185871] kauditd_printk_skb: 187 callbacks suppressed [ 1603.185887] audit: type=1400 audit(2000000584.776:32721): avc: denied { read } for pid=1290 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1603.439996] audit: type=1400 audit(2000000585.026:32722): avc: denied { map_create } for pid=1298 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1603.589838] audit: type=1400 audit(2000000585.086:32723): avc: denied { map_read map_write } for pid=1298 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:43:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x1902}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1603.833322] audit: type=1400 audit(2000000585.106:32724): avc: denied { prog_load } for pid=1298 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1604.009267] audit: type=1400 audit(2000000585.156:32725): avc: denied { map_create } for pid=1298 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1604.148550] audit: type=1400 audit(2000000585.176:32726): avc: denied { map_read map_write } for pid=1298 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:43:05 executing program 3: r0 = socket$inet(0x10, 0x3, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40040, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r2, &(0x7f00000001c0)="4aec3185a86b8de492873419b0e0b62f3413ff9ca13d3c3313ae1769d8a112abd2cf07b5c71216ec49c8e85f7462f6011b0ad80a91ca93a6aa05166bdae3222087b04c5abf7dd8f109750617d263007be46ff99a001243cd516d006e64f42a1ad694a9a3ae7fa7a5b80cc38f235dc9af331ba8c5ff534c4d26106fcb52540dc59ae30137e37d6ec4657d42c236eb798a147c9825f4b513edb28a9861135a8f25564be368", &(0x7f0000000340)=""/235}, 0x18) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) [ 1604.345183] audit: type=1400 audit(2000000585.216:32727): avc: denied { map } for pid=1300 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1604.480804] audit: type=1400 audit(2000000585.236:32728): avc: denied { map } for pid=1300 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000012c0)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001300)='/dev/hwrng\x00', 0x280000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="b8000000feffffff00000000000000000100000000000000000000000000000001000000000000000000000000000000ffffff7f000000000000000000000000040000000000000027180000000000000000000000000000060000000000000000000000000000000000000081000000000000000200000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="09000002000a5edc189f0ea3f500040000a5ebe300000004000000000000000e00006465762f736e617074000000000000000000001000"], 0xb8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, &(0x7f00000003c0)=0xbef2b81c66b67d14) getresgid(0x0, &(0x7f0000000bc0), 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000580)) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/57, 0x252) fcntl$dupfd(r1, 0x0, r1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 03:43:06 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x401, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000040)={0x5, "36b9898e3571b5ea914e6b7519d35e8647056c0000002100"}) [ 1604.699962] audit: type=1400 audit(2000000585.266:32729): avc: denied { map } for pid=1300 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:06 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x602041, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x8, 0x2f, 0xf9c, 0x541, 0x7, 0x6, 0xcc, {0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x100000001, 0x7, 0x2, 0x8000, 0x7}}, &(0x7f0000000080)=0xb0) socket(0xf, 0xb, 0xff) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0xfffffffffffffe00}, 0x8) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1604.912304] audit: type=1400 audit(2000000585.276:32730): avc: denied { map } for pid=1300 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x3f00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, [], 0x14}, 0x2}, 0x1c) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000001140)={'syz', 0x1}, &(0x7f00000011c0)="2545f903ac98b61444229213e55bec9eed03e922a5bb7b80ccea5bdfa8c9b3770bc974ba67c67e30deb18de94dec113e1ee5f6ffb255785a504af4d22e1a9cc9", 0x40, 0xfffffffffffffff8) keyctl$set_timeout(0xf, r3, 0x401) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev, 0x540}, 0x1c) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000140)=""/4096, &(0x7f0000000080)=0x8) 03:43:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x2c, 0x18, 0xd19, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0x2c}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x410400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 03:43:07 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20003, 0x0) write$selinux_context(r1, &(0x7f0000000080)='system_u:object_r:update_modules_exec_t:s0\x00', 0x2b) write$P9_RVERSION(r1, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x7ff, 0x8, '9P2000.L'}, 0x15) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="f90b00000700ef96fac175072616e7d7a74df4dc2d"], 0xe) 03:43:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000640)={'vcan0\x00'}) connect(r0, &(0x7f0000000000)=@l2={0x1f, 0x0, {0x1, 0x1, 0x7fffffff, 0x1000000000000000, 0x32}, 0x6, 0xd435}, 0x395) sendmsg$can_bcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0400000002001f00000000dfff000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="00000000010000000000000010000000e46ac5c64ed09616"], 0x48}}, 0x0) 03:43:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4000}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x90000, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x1c5282) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3ff) exit(0x0) close(0xffffffffffffffff) fcntl$dupfd(r1, 0x406, r0) socket$unix(0x1, 0x1, 0x0) 03:43:08 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x420000) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000040)={0x40, "9117e4c701c8b6ab129a9cec8ac903bacb3e188baf78cb6f1a2c13def26bf4a6", 0x3, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) 03:43:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)=r1) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3}) 03:43:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000, 0x2) 03:43:09 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8380, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) getgroups(0x1, &(0x7f0000000240)=[0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r6 = getuid() r7 = getgid() sendmsg$netlink(r1, &(0x7f0000000380)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080), 0x0, &(0x7f0000000300)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x60, 0x40000c0}, 0x800) 03:43:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4703}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1608.237667] kauditd_printk_skb: 163 callbacks suppressed [ 1608.237682] audit: type=1400 audit(2000000589.828:32894): avc: denied { map } for pid=1370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1608.397764] audit: type=1400 audit(2000000589.868:32895): avc: denied { map } for pid=1370 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1608.861695] audit: type=1400 audit(2000000590.459:32896): avc: denied { map } for pid=1384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 1609.012105] audit: type=1400 audit(2000000590.479:32897): avc: denied { map } for pid=1384 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FIDEDUPERANGE(r2, 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) [ 1609.167378] audit: type=1400 audit(2000000590.539:32898): avc: denied { map } for pid=1384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 4: r0 = epoll_create1(0x80000) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) write$P9_RLERRORu(r1, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) [ 1609.320439] audit: type=1400 audit(2000000590.539:32899): avc: denied { map } for pid=1384 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4800}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1609.496593] audit: type=1400 audit(2000000590.589:32900): avc: denied { map } for pid=1384 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.659923] audit: type=1400 audit(2000000590.689:32901): avc: denied { map } for pid=1384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:11 executing program 3: r0 = memfd_create(&(0x7f0000000600)='\x10', 0x4) r1 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x1ffffffffffffff) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x10, r0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8080, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100)=0x8001, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000000, &(0x7f0000000040)="0adc1f123c123f3188b070") dup2(r1, r0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) [ 1609.849731] audit: type=1400 audit(2000000590.709:32902): avc: denied { map } for pid=1384 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.036695] audit: type=1400 audit(2000000590.749:32903): avc: denied { map_create } for pid=1390 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:43:11 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x7, 0x8200, 0x4, 0x2, 0x92ac, 0x4, 0xd0, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r2, 0x69e5800}, &(0x7f00000000c0)=0x8) setreuid(r1, r1) perf_event_open(&(0x7f000025c000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448e2, &(0x7f0000000000)={0x10118, 0x0}) 03:43:12 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = gettid() waitid(0x1, r1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) 03:43:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x4c00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1611.010191] overlayfs: filesystem on './file0' not supported as upperdir 03:43:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x8082, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x440, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x7ffffffff002, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) 03:43:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x100, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x0}, 0x18) 03:43:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x2, 0x0, [{0xfffffffffffffeff, 0x3, 0x0, 0x0, @msi={0x9, 0x1, 0x1}}, {0x8, 0x4, 0x0, 0x0, @sint={0x7ff, 0xaa29}}]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f00000000c0)={0x2, 0x0, [{0x0, 0x3, 0x0, 0x0, @irqchip={0x9, 0x724}}, {0x1c, 0x1, 0x0, 0x0, @sint={0x5, 0x4}}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:43:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x6800}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0xfffffffffffffe02) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000072a0001002d00000000b2096d31ee90e752738c5f7ac8ec72ba9fc9d5e95f8c76e85f05d6f1032422781571044337a82d9d302944685c4e4502f561243a37"], 0xe) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) 03:43:13 executing program 2: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip6gre0\x00', 0xfffffdc8) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000040)=""/57, 0x39, 0x2, 0x0, 0x28e) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='memory.high\x00f\xe0\a\xbc\x19W\x95\bY\xe6\x1a\x10L\x84Q\xcd\xf5\xa1c\x8f\xe9I5R=\xad\xfa\x9c\aY\xef\x01,\xc25K\x8b\xf9\x0e\x90\xff<\x00\xa9\xe0x\xfaq\xd7-Z\f\x85&\"<\xb8Y\x8aD\xc7\x00\xe7\xe4 \xa2\xb6g(Z\xd5w\x84\xd1\x99X\xdaQ+-\xf1\v$\xcdv\xe6`\\\xc4\xdf\x1eN\x8c\\\x9c\xe8T\x06\x8eLk\x88\x9d2d\xe0:3S\xef\x8b\x10\xa8\x89\xa4\xfe\xea\x01\x05\xfb\x81\x7f\x15\xe4b\xf0\x9c[\x91\x1d \xc0>\xaeg\xaa\r\xe5\r\xc7x.\x8c8\x83\x8eIO\xb8\\N1#H\xf2\x8f\x03V\xcf\xdb\xc8\xda\xa7)\x7f\xe6\xe3[\xf3', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x10000000000000ed) clone(0x80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1612.484520] misc userio: The device must be registered before sending interrupts 03:43:14 executing program 3: socketpair$unix(0x1, 0x100000000003, 0x0, &(0x7f0000000180)) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) prctl$PR_GET_NAME(0x10, &(0x7f0000001680)=""/114) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) 03:43:14 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x4800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x375, 0x3, 0x81, 0x0, 0x4, 0x40480, 0x862a88ef3528cf54, 0x3, 0x6, 0x96, 0x7d06, 0x5, 0x123, 0x4, 0x1f, 0xfffffffffffffff8, 0x7e40, 0xc4ea, 0xdbc9, 0x4, 0x94420000, 0x6, 0x400, 0x79, 0xac, 0x81, 0x0, 0x3ff, 0x9, 0x8000, 0x4, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x7fff, 0x3, @perf_bp={&(0x7f0000000000), 0x9}, 0x8, 0x2, 0x6, 0x7, 0x10000, 0x2322, 0x81}, r0, 0x5, r1, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x4) 03:43:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x224000, 0x0) write$P9_RSTAT(r1, &(0x7f00000001c0)={0x57, 0x7d, 0x2, {0x0, 0x50, 0x2, 0xb7, {0x2, 0x2, 0x7}, 0x100000, 0x9, 0x6, 0x6, 0x11, '/dev/dlm-monitor\x00', 0x9, 'nodevem0*', 0x1, '-', 0x2, '-}'}}, 0x57) write$P9_RLERRORu(r0, &(0x7f0000000180)={0xe, 0x7, 0x40, {{0x1, '-'}, 0x6}}, 0xe) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) 03:43:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x6c00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1613.279047] kauditd_printk_skb: 136 callbacks suppressed [ 1613.279062] audit: type=1400 audit(2000000594.881:33040): avc: denied { map } for pid=1458 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1613.533496] audit: type=1400 audit(2000000594.931:33041): avc: denied { map } for pid=1458 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:15 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3f, 0x1, [0x40]}, &(0x7f0000000080)=0xa) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0xffffffff00000000, 0xe7, "b093a69e6ef8a1d9b8cbef6ff5b6fcd94654e72248f44146d76e3d9da06c9abb6fcc512305c261ef40ea6da603230f379817191d9148c29b64ee5708d0fabe293caea952629c6f53882109634b23c1d007e157355e84aba48989344297950537d06a8492a08dc649a0518db3f7eccdb8d334c60cc58a02e0b899d56db175ce614b92ca784780a5b8efe57d7fe29185059570272e486e3a0494eebf27d76a7897e801fdb2f84e86e34a5f984ea82a4e5c710403c205ad5de5ab323a5b7e05315917d71a8196e69c61855debd50ef1ee6be02d11c620545046bd22ed4c32ce659dc238dadf08724d"}, 0xef) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) [ 1613.768936] audit: type=1400 audit(2000000594.931:33042): avc: denied { map } for pid=1458 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x100, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @remote, 0x1}, 0x3ce) r2 = socket(0x400000000010, 0x3, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea1085d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb79040000000000000000000000", 0xe0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000000c0)={[0x400, 0x3, 0x3, 0x200, 0x100000001, 0x9, 0x1f, 0x2, 0x8, 0x6, 0x1, 0x2, 0x5, 0xb8, 0x0, 0x100000001], 0x5002, 0x40802}) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000002c0)=""/250) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) [ 1613.947766] audit: type=1400 audit(2000000595.051:33043): avc: denied { map } for pid=1464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:15 executing program 3: r0 = socket(0x8000000000009, 0x7, 0x5f74) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff59, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000780)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) mmap$binder(&(0x7f000003e000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000240)={0x0, "f5eb98c6f3688b9566d5a8da9cbe53cb03b4b6c886237d6e8544f182f088a812", 0x3, 0x1}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) semget(0x0, 0x0, 0x40) semctl$SEM_STAT(0x0, 0x1000000000000004, 0x12, 0x0) sync() ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1f) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000001940)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0xd8911165cd640705) socket$unix(0x1, 0x7, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x9, 0x100000000, 0x8, 0x0, 0x3, 0x1c}) [ 1614.094251] audit: type=1400 audit(2000000595.051:33044): avc: denied { map } for pid=1464 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.287938] audit: type=1400 audit(2000000595.091:33045): avc: denied { map } for pid=1458 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e0000000700a20542aa00000000"], 0xe) 03:43:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xd4, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0xffffff29) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f00000001c0)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea", 0xc9, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x181, 0x1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) [ 1614.497638] audit: type=1400 audit(2000000595.091:33046): avc: denied { map } for pid=1458 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.659491] audit: type=1400 audit(2000000595.101:33047): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x7400}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1614.819381] audit: type=1400 audit(2000000595.111:33048): avc: denied { map } for pid=1464 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1615.044035] audit: type=1400 audit(2000000595.231:33049): avc: denied { map } for pid=1464 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1615.093042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:43:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x3, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000002c0)={'veth0_to_hsr\x00', 0xffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x80000, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000006c0)) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x20, 0x100000000, 0x30ce, 0x6, 0x0, 0xffff, 0x40, 0x2, 0xfff, 0x0, 0x5, 0x3, 0x8, 0x6, 0xeaa7, 0x10001, 0x4, 0x6, 0x1, 0x60f, 0x9, 0x0, 0x101, 0x1e300, 0x1, 0x0, 0x7, 0x5, 0x0, 0x8, 0xfffffffffffffffb, 0x1, 0xf, 0x3, 0x1f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000400), 0x2}, 0xa, 0x1, 0x0, 0x5, 0x8, 0x1, 0x7}, r2, 0x2, r3, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000d2abd7000fddbdf25050000000c0002000800020000000100180004000000000000000000030000000800030040010000380007000c000300020000000000060608000200090074a2080001001000000008000296d30000000800010000000000180002000000000c00090008000200020000000400090007ca4580ab483118300d13b800"], 0x80}, 0x1, 0x0, 0x0, 0x4000080}, 0x8040) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x4081) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES64], 0x8) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000480)={0x7, 0x3, 0x20, "e3335fcf4b478b75fdc3be0b8901cc453822463c14655216d52bb4f276d18996cf9f7a7d40da3438edb6407fe3d0a11037934daa2c54ffac9cd4cd4f", 0x0, "0d96d24a0c72bf62c1f06f23a126b86ed3d9aee186534add1e75ab10c585a34d738d6d4a3860b5dfb6c6804c5ddff13a813ebefa4963d980d169fdd3", 0x20}) [ 1615.423199] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 03:43:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x7f) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000780)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0xc) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800008}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x24, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1f}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20008080}, 0x4008800) ioctl(r1, 0x100000001, &(0x7f0000000280)) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x2b, "03bc867fca249953e5fe7ef8a30c6060e117fecbf761558c0f0132e7b0a384e3715895bc9c9742752c22eb"}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)={0x2, 0x1, [0x1, 0x5, 0x0, 0x0, 0x7, 0x4, 0x28f, 0x71a]}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x6, 0x0, 0x0, 0x7, 0x9, 0x300000000}) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000400)={0xff, 0x7f, 0x3, 0x0, 0x3f}) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) setsockopt(r4, 0x6, 0x1, &(0x7f0000000100)="dbd205ef42a50413beb6daa54ed2c3078876d040048c4ff72a3fbf", 0x1b) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$tun(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC=r5], 0x1) r6 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040), 0xfffffffffffffd03) close(r6) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) 03:43:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/udp6\x00') ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000140)={0x7, 0x3}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xe, 0x7, 0x0, {{0x1, '-'}}}, 0xe) write$P9_RWSTAT(r1, &(0x7f0000000180)={0x7, 0x7f, 0x1}, 0x7) 03:43:17 executing program 3: r0 = socket$inet6(0xa, 0x200000000040800, 0x20000001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr="c607318d9b0122f16583a2bd06fe90fa", 0x800, 0x3, 0x0, 0x0, 0x5c}, 0x2ee) 03:43:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000032ff4)={0x2000}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000040)=""/140) mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x5) setitimer(0x1, &(0x7f0000032fe0)={{}, {0x0, 0x2710}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) getitimer(0x1, &(0x7f0000036fe0)) 03:43:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x7a00}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x40, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000380)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3, 0x4c00}, &(0x7f0000000340)='\x01\xcf\x9d\x02A(!\xf0\xcb7\xe8\x97r)\x16\x04J\t0+\xae\xa6^\xfd^\xe2\x19\x97\xe8\x88$\xed\x7f\xdb\xf9\x9f\x923e\v\x9d.=\xf4\x9d\x95Q\x89b\xf3\xad\x1e\x03', 0xfffffffffffffffd) recvfrom$inet(r1, &(0x7f00000003c0)=""/156, 0x9c, 0x40000001, &(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xa7e}, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="fbffffff0000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002004e20e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003fd3d81f9ceb900c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac14141100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ac141412000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x310) tkill(0x0, 0x11) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getpid() getpgrp(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="800000001000010019000300e6010094f1f4d4e6a84f710001008eb3477100000040000000400000800000e7ff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x48000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000001c0)={0xff, 0x1, 0x5, 0x85, 0x7}, 0x14) prctl$PR_SET_TSC(0x1a, 0x3) 03:43:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="dd"], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0x7f, 0x2, 0x7171, 0x0, &(0x7f0000000100)=[{}, {}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) write$cgroup_int(r0, &(0x7f0000000280)=0x10001, 0xfffffffffffffc6d) 03:43:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) write$P9_RLERRORu(r0, &(0x7f0000000040)={0xfffffffffffffe61, 0x7, 0x0, {{0x1, '\x92'}}}, 0xe) 03:43:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x1000000, 0x7f01}, [@map={0x18, 0x3, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 03:43:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x280, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206070000a843096c2623690400080004000c0816000b000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:43:19 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x9d06, 0x2401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0xfff, 0x4, 0xffffffffffffff00, 0x0, 0x15, 0x18c0, 0xc, 0x9, 0x5, 0x3, 0x6, 0x8, 0x5, 0xd864, 0x20, 0x400000000000000, 0x400, 0xf8dc, 0x0, 0xba5a, 0xffffffff, 0x10000, 0x514, 0x5, 0xa0, 0x401, 0x0, 0x2, 0xb3c, 0x0, 0x2, 0xfff, 0x1f, 0x2, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x9, 0xe33}, 0x810, 0x4, 0x80, 0x8, 0x3, 0x100, 0x7ff}, r0, 0xc, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x101, 0x0) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000000)="120000001600e70d017b19000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000006bc0)={0x0, 0x0, 0x0}, 0x40000) [ 1618.400315] kauditd_printk_skb: 132 callbacks suppressed [ 1618.400330] audit: type=1400 audit(2000000599.993:33182): avc: denied { map } for pid=1548 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.444265] audit: type=1400 audit(2000000599.993:33183): avc: denied { map } for pid=1548 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.474193] audit: type=1400 audit(2000000600.003:33184): avc: denied { map } for pid=1548 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.500855] audit: type=1400 audit(2000000600.003:33185): avc: denied { map } for pid=1548 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.540038] audit: type=1400 audit(2000000600.023:33186): avc: denied { create } for pid=1515 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1618.577196] audit: type=1400 audit(2000000600.033:33187): avc: denied { write } for pid=1515 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1618.619684] audit: type=1400 audit(2000000600.033:33188): avc: denied { map } for pid=1548 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.670349] audit: type=1400 audit(2000000600.033:33189): avc: denied { read } for pid=1515 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1618.705440] audit: type=1400 audit(2000000600.053:33190): avc: denied { map } for pid=1548 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1618.732535] audit: type=1400 audit(2000000600.053:33191): avc: denied { map } for pid=1548 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1780.754445] INFO: task syz-executor0:8328 blocked for more than 140 seconds. [ 1780.761782] Not tainted 5.0.0-rc3+ #44 [ 1780.766252] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1780.774248] syz-executor0 D20440 8328 1 0x00000004 [ 1780.779905] Call Trace: [ 1780.782484] __schedule+0x897/0x1e60 [ 1780.786830] ? __schedule+0x89f/0x1e60 [ 1780.790733] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1780.795797] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1780.800804] ? mark_held_locks+0xb1/0x100 [ 1780.805004] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1780.809843] ? mark_held_locks+0xb1/0x100 [ 1780.813978] ? _raw_spin_unlock_irq+0x28/0x90 [ 1780.818518] schedule+0xfe/0x350 [ 1780.821873] ? preempt_schedule_common+0x4f/0xe0 [ 1780.826673] ? __schedule+0x1e60/0x1e60 [ 1780.830641] ? preempt_schedule+0x4b/0x60 [ 1780.834828] ? ___preempt_schedule+0x16/0x18 [ 1780.839252] rwsem_down_read_failed+0x360/0x6d0 [ 1780.843935] ? rt_mutex_futex_unlock+0x120/0x120 [ 1780.848735] ? lock_downgrade+0x910/0x910 [ 1780.852875] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1780.858302] ? rcuwait_wake_up+0x1c8/0x300 [ 1780.862534] ? check_preemption_disabled+0x48/0x290 [ 1780.867593] call_rwsem_down_read_failed+0x18/0x30 [ 1780.872527] __percpu_down_read+0x142/0x1d0 [ 1780.877107] ? percpu_free_rwsem+0xa0/0xa0 [ 1780.881474] ? rcu_read_lock_sched_held+0x110/0x130 [ 1780.886854] uprobe_start_dup_mmap+0xbf/0xe0 [ 1780.891265] copy_process+0x3041/0x8710 [ 1780.895316] ? page_swapcount+0x1c0/0x1c0 [ 1780.899463] ? _raw_spin_unlock_irq+0x28/0x90 [ 1780.903956] ? __cleanup_sighand+0x70/0x70 [ 1780.908244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.913931] ? debug_smp_processor_id+0x1c/0x20 [ 1780.919284] ? perf_trace_lock+0x12f/0x750 [ 1780.923521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.929115] ? reuse_swap_page+0x453/0x14a0 [ 1780.933445] ? swp_swapcount+0x540/0x540 [ 1780.937593] ? debug_smp_processor_id+0x1c/0x20 [ 1780.942263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1780.947844] ? __lock_acquire+0x572/0x4a30 [ 1780.952087] ? do_raw_spin_trylock+0x270/0x270 [ 1780.956716] ? mark_held_locks+0x100/0x100 [ 1780.960946] ? check_preemption_disabled+0x48/0x290 [ 1780.966000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.971528] ? check_preemption_disabled+0x48/0x290 [ 1780.976590] ? debug_smp_processor_id+0x1c/0x20 [ 1780.981281] ? perf_trace_lock+0x12f/0x750 [ 1780.985714] ? add_lock_to_list.isra.0+0x450/0x450 [ 1780.990667] ? __might_fault+0x12b/0x1e0 [ 1780.994930] ? find_held_lock+0x35/0x120 [ 1780.998983] ? __might_fault+0x12b/0x1e0 [ 1781.003047] ? lock_acquire+0x1db/0x570 [ 1781.007087] ? lock_downgrade+0x910/0x910 [ 1781.011232] ? lock_release+0xc40/0xc40 [ 1781.015311] _do_fork+0x1a9/0x1170 [ 1781.018847] ? fork_idle+0x1d0/0x1d0 [ 1781.022547] ? kasan_check_read+0x11/0x20 [ 1781.026731] ? _copy_to_user+0xc9/0x120 [ 1781.030700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.036324] ? put_timespec64+0x115/0x1b0 [ 1781.040467] ? nsecs_to_jiffies+0x30/0x30 [ 1781.045257] ? do_syscall_64+0x8c/0x800 [ 1781.049226] ? do_syscall_64+0x8c/0x800 [ 1781.053195] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1781.057841] ? trace_hardirqs_on+0xbd/0x310 [ 1781.062160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.067736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.073110] ? trace_hardirqs_off_caller+0x300/0x300 [ 1781.078281] __x64_sys_clone+0xbf/0x150 [ 1781.082256] do_syscall_64+0x1a3/0x800 [ 1781.086338] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1781.091258] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1781.096321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1781.101168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.106402] RIP: 0033:0x45666a [ 1781.109654] Code: ff 48 8b 54 24 28 e9 ad fe ff ff 8b 9c 24 88 00 00 00 e9 6f ff ff ff 48 8b 6c 24 70 48 83 c4 78 c3 48 8b 6c 24 70 48 83 c4 78 e8 30 38 fd ff 0f 0b e8 09 39 fd ff 0f 0b e8 d2 38 00 00 e9 8d [ 1781.128614] RSP: 002b:00007ffefe4af4f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1781.136340] RAX: ffffffffffffffda RBX: 00007ffefe4af4f0 RCX: 000000000045666a [ 1781.143594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1781.150964] RBP: 00007ffefe4af530 R08: 0000000000000001 R09: 0000000000fc0940 [ 1781.159083] R10: 0000000000fc0c10 R11: 0000000000000246 R12: 0000000000000001 [ 1781.166417] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1781.173728] INFO: task syz-executor1:8331 blocked for more than 140 seconds. [ 1781.181535] Not tainted 5.0.0-rc3+ #44 [ 1781.185967] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1781.193920] syz-executor1 D20440 8331 1 0x00000004 [ 1781.199586] Call Trace: [ 1781.202165] __schedule+0x897/0x1e60 [ 1781.206039] ? __schedule+0x89f/0x1e60 [ 1781.210043] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1781.215112] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1781.220117] ? mark_held_locks+0xb1/0x100 [ 1781.224319] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1781.229153] ? mark_held_locks+0xb1/0x100 [ 1781.233305] ? _raw_spin_unlock_irq+0x28/0x90 [ 1781.237857] schedule+0xfe/0x350 [ 1781.241214] ? preempt_schedule_common+0x4f/0xe0 [ 1781.246043] ? __schedule+0x1e60/0x1e60 [ 1781.250018] ? preempt_schedule+0x4b/0x60 [ 1781.254208] ? ___preempt_schedule+0x16/0x18 [ 1781.258610] rwsem_down_read_failed+0x360/0x6d0 [ 1781.263264] ? rt_mutex_futex_unlock+0x120/0x120 [ 1781.268075] ? lock_downgrade+0x910/0x910 [ 1781.272304] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1781.277659] ? rcuwait_wake_up+0x1c8/0x300 [ 1781.281900] ? check_preemption_disabled+0x48/0x290 [ 1781.286973] call_rwsem_down_read_failed+0x18/0x30 [ 1781.291912] __percpu_down_read+0x142/0x1d0 [ 1781.296288] ? percpu_free_rwsem+0xa0/0xa0 [ 1781.300511] ? rcu_read_lock_sched_held+0x110/0x130 [ 1781.306162] uprobe_start_dup_mmap+0xbf/0xe0 [ 1781.310574] copy_process+0x3041/0x8710 [ 1781.314636] ? page_swapcount+0x1c0/0x1c0 [ 1781.318781] ? _raw_spin_unlock_irq+0x28/0x90 [ 1781.323291] ? __cleanup_sighand+0x70/0x70 [ 1781.327589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.333124] ? debug_smp_processor_id+0x1c/0x20 [ 1781.337885] ? perf_trace_lock+0x12f/0x750 [ 1781.342109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.347689] ? reuse_swap_page+0x453/0x14a0 [ 1781.352003] ? swp_swapcount+0x540/0x540 [ 1781.356127] ? debug_smp_processor_id+0x1c/0x20 [ 1781.360790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1781.366372] ? __lock_acquire+0x572/0x4a30 [ 1781.370602] ? do_raw_spin_trylock+0x270/0x270 [ 1781.375234] ? mark_held_locks+0x100/0x100 [ 1781.379461] ? check_preemption_disabled+0x48/0x290 [ 1781.384526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.390229] ? check_preemption_disabled+0x48/0x290 [ 1781.395335] ? debug_smp_processor_id+0x1c/0x20 [ 1781.400067] ? perf_trace_lock+0x12f/0x750 [ 1781.404391] ? add_lock_to_list.isra.0+0x450/0x450 [ 1781.409338] ? __might_fault+0x12b/0x1e0 [ 1781.413390] ? find_held_lock+0x35/0x120 [ 1781.417494] ? __might_fault+0x12b/0x1e0 [ 1781.421572] ? lock_acquire+0x1db/0x570 [ 1781.425717] ? lock_downgrade+0x910/0x910 [ 1781.429865] ? lock_release+0xc40/0xc40 [ 1781.433826] _do_fork+0x1a9/0x1170 [ 1781.437943] ? fork_idle+0x1d0/0x1d0 [ 1781.441664] ? kasan_check_read+0x11/0x20 [ 1781.445851] ? _copy_to_user+0xc9/0x120 [ 1781.449812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.455420] ? put_timespec64+0x115/0x1b0 [ 1781.459584] ? nsecs_to_jiffies+0x30/0x30 [ 1781.463725] ? do_syscall_64+0x8c/0x800 [ 1781.467809] ? do_syscall_64+0x8c/0x800 [ 1781.471791] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1781.476407] ? trace_hardirqs_on+0xbd/0x310 [ 1781.480763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.486361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.491715] ? trace_hardirqs_off_caller+0x300/0x300 [ 1781.496867] __x64_sys_clone+0xbf/0x150 [ 1781.500948] do_syscall_64+0x1a3/0x800 [ 1781.504908] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1781.509946] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1781.515003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1781.519847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.525090] RIP: 0033:0x45666a [ 1781.528273] Code: ff 48 8b 54 24 28 e9 ad fe ff ff 8b 9c 24 88 00 00 00 e9 6f ff ff ff 48 8b 6c 24 70 48 83 c4 78 c3 48 8b 6c 24 70 48 83 c4 78 e8 30 38 fd ff 0f 0b e8 09 39 fd ff 0f 0b e8 d2 38 00 00 e9 8d [ 1781.547223] RSP: 002b:00007ffd49863270 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1781.555115] RAX: ffffffffffffffda RBX: 00007ffd49863270 RCX: 000000000045666a [ 1781.562377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1781.570294] RBP: 00007ffd498632b0 R08: 0000000000000001 R09: 000000000161a940 [ 1781.577595] R10: 000000000161ac10 R11: 0000000000000246 R12: 0000000000000001 [ 1781.584903] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 1781.592202] INFO: task syz-executor2:8334 blocked for more than 140 seconds. [ 1781.599441] Not tainted 5.0.0-rc3+ #44 [ 1781.603992] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1781.612059] syz-executor2 D20088 8334 1 0x00000006 [ 1781.617856] Call Trace: [ 1781.620444] __schedule+0x897/0x1e60 [ 1781.624187] ? __schedule+0x89f/0x1e60 [ 1781.628067] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1781.633061] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1781.638142] ? mark_held_locks+0xb1/0x100 [ 1781.642290] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1781.647202] ? mark_held_locks+0xb1/0x100 [ 1781.651351] ? _raw_spin_unlock_irq+0x28/0x90 [ 1781.655909] schedule+0xfe/0x350 [ 1781.659268] ? preempt_schedule_common+0x4f/0xe0 [ 1781.664098] ? __schedule+0x1e60/0x1e60 [ 1781.668068] ? preempt_schedule+0x4b/0x60 [ 1781.672213] ? ___preempt_schedule+0x16/0x18 [ 1781.676707] rwsem_down_read_failed+0x360/0x6d0 [ 1781.681375] ? rt_mutex_futex_unlock+0x120/0x120 [ 1781.686241] ? lock_downgrade+0x910/0x910 [ 1781.690381] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1781.696353] ? rcuwait_wake_up+0x1c8/0x300 [ 1781.700599] ? check_preemption_disabled+0x48/0x290 [ 1781.705670] call_rwsem_down_read_failed+0x18/0x30 [ 1781.710590] __percpu_down_read+0x142/0x1d0 [ 1781.714937] ? percpu_free_rwsem+0xa0/0xa0 [ 1781.719172] ? rcu_read_lock_sched_held+0x110/0x130 [ 1781.724243] uprobe_start_dup_mmap+0xbf/0xe0 [ 1781.728645] copy_process+0x3041/0x8710 [ 1781.732738] ? page_swapcount+0x1c0/0x1c0 [ 1781.736934] ? _raw_spin_unlock_irq+0x28/0x90 [ 1781.741494] ? __cleanup_sighand+0x70/0x70 [ 1781.745834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.751376] ? debug_smp_processor_id+0x1c/0x20 [ 1781.756072] ? perf_trace_lock+0x12f/0x750 [ 1781.760302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.765905] ? reuse_swap_page+0x453/0x14a0 [ 1781.770220] ? swp_swapcount+0x540/0x540 [ 1781.774448] ? debug_smp_processor_id+0x1c/0x20 [ 1781.779190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1781.784796] ? __lock_acquire+0x572/0x4a30 [ 1781.789029] ? do_raw_spin_trylock+0x270/0x270 [ 1781.793598] ? mark_held_locks+0x100/0x100 [ 1781.797875] ? check_preemption_disabled+0x48/0x290 [ 1781.802941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.808666] ? check_preemption_disabled+0x48/0x290 [ 1781.813713] ? debug_smp_processor_id+0x1c/0x20 [ 1781.818376] ? perf_trace_lock+0x12f/0x750 [ 1781.822601] ? add_lock_to_list.isra.0+0x450/0x450 [ 1781.828176] ? __might_fault+0x12b/0x1e0 [ 1781.832228] ? find_held_lock+0x35/0x120 [ 1781.836312] ? __might_fault+0x12b/0x1e0 [ 1781.840359] ? lock_acquire+0x1db/0x570 [ 1781.844374] ? lock_downgrade+0x910/0x910 [ 1781.848535] ? lock_release+0xc40/0xc40 [ 1781.852503] _do_fork+0x1a9/0x1170 [ 1781.856092] ? fork_idle+0x1d0/0x1d0 [ 1781.859808] ? kasan_check_read+0x11/0x20 [ 1781.864026] ? _copy_to_user+0xc9/0x120 [ 1781.868005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.873537] ? put_timespec64+0x115/0x1b0 [ 1781.877748] ? nsecs_to_jiffies+0x30/0x30 [ 1781.881954] ? do_syscall_64+0x8c/0x800 [ 1781.886002] ? do_syscall_64+0x8c/0x800 [ 1781.889980] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1781.894600] ? trace_hardirqs_on+0xbd/0x310 [ 1781.898996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.904587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.909960] ? trace_hardirqs_off_caller+0x300/0x300 [ 1781.915183] __x64_sys_clone+0xbf/0x150 [ 1781.919169] do_syscall_64+0x1a3/0x800 [ 1781.923053] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1781.928057] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1781.933097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1781.938057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.943359] RIP: 0033:0x45666a [ 1781.946601] Code: ff 48 8b 54 24 28 e9 ad fe ff ff 8b 9c 24 88 00 00 00 e9 6f ff ff ff 48 8b 6c 24 70 48 83 c4 78 c3 48 8b 6c 24 70 48 83 c4 78 e8 30 38 fd ff 0f 0b e8 09 39 fd ff 0f 0b e8 d2 38 00 00 e9 8d [ 1781.966102] RSP: 002b:00007ffc2bc812f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1781.973860] RAX: ffffffffffffffda RBX: 00007ffc2bc812f0 RCX: 000000000045666a [ 1781.981115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1781.988495] RBP: 00007ffc2bc81330 R08: 0000000000000001 R09: 0000000000ebe940 [ 1781.995807] R10: 0000000000ebec10 R11: 0000000000000246 R12: 0000000000000001 [ 1782.003067] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 1782.010486] INFO: task syz-executor3:31602 blocked for more than 140 seconds. [ 1782.017830] Not tainted 5.0.0-rc3+ #44 [ 1782.022224] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1782.030247] syz-executor3 D21640 31602 1 0x00000004 [ 1782.035904] Call Trace: [ 1782.038585] __schedule+0x897/0x1e60 [ 1782.042293] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1782.047400] ? retint_kernel+0x2d/0x2d [ 1782.051293] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1782.056176] ? mark_held_locks+0xb1/0x100 [ 1782.060322] ? _raw_spin_unlock_irq+0x28/0x90 [ 1782.064884] schedule+0xfe/0x350 [ 1782.068239] ? kasan_check_read+0x11/0x20 [ 1782.072490] ? __schedule+0x1e60/0x1e60 [ 1782.076517] ? trace_hardirqs_off_caller+0x300/0x300 [ 1782.081605] ? do_raw_spin_trylock+0x270/0x270 [ 1782.086230] rwsem_down_read_failed+0x360/0x6d0 [ 1782.090891] ? rt_mutex_futex_unlock+0x120/0x120 [ 1782.096380] ? lock_downgrade+0x910/0x910 [ 1782.100550] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1782.105893] ? rcuwait_wake_up+0x1c8/0x300 [ 1782.110131] ? check_preemption_disabled+0x48/0x290 [ 1782.115256] call_rwsem_down_read_failed+0x18/0x30 [ 1782.120176] __percpu_down_read+0x142/0x1d0 [ 1782.124528] ? percpu_free_rwsem+0xa0/0xa0 [ 1782.128950] ? rcu_read_lock_sched_held+0x110/0x130 [ 1782.134004] uprobe_start_dup_mmap+0xbf/0xe0 [ 1782.138402] copy_process+0x3041/0x8710 [ 1782.142373] ? page_swapcount+0x1c0/0x1c0 [ 1782.146604] ? __cleanup_sighand+0x70/0x70 [ 1782.150835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.156417] ? debug_smp_processor_id+0x1c/0x20 [ 1782.161080] ? perf_trace_lock+0x12f/0x750 [ 1782.165346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.170892] ? reuse_swap_page+0x453/0x14a0 [ 1782.175272] ? swp_swapcount+0x540/0x540 [ 1782.179325] ? debug_smp_processor_id+0x1c/0x20 [ 1782.184047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1782.189577] ? __lock_acquire+0x572/0x4a30 [ 1782.194130] ? do_raw_spin_trylock+0x270/0x270 [ 1782.198815] ? mark_held_locks+0x100/0x100 [ 1782.203042] ? check_preemption_disabled+0x48/0x290 [ 1782.208133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.213817] ? check_preemption_disabled+0x48/0x290 [ 1782.218921] ? debug_smp_processor_id+0x1c/0x20 [ 1782.224139] ? perf_trace_lock+0x12f/0x750 [ 1782.228365] ? add_lock_to_list.isra.0+0x450/0x450 [ 1782.233295] ? __might_fault+0x12b/0x1e0 [ 1782.237543] ? find_held_lock+0x35/0x120 [ 1782.241619] ? __might_fault+0x12b/0x1e0 [ 1782.245716] ? lock_acquire+0x1db/0x570 [ 1782.249685] ? lock_downgrade+0x910/0x910 [ 1782.253871] ? lock_release+0xc40/0xc40 [ 1782.257845] _do_fork+0x1a9/0x1170 [ 1782.261372] ? fork_idle+0x1d0/0x1d0 [ 1782.265165] ? kasan_check_read+0x11/0x20 [ 1782.269323] ? _copy_to_user+0xc9/0x120 [ 1782.273290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1782.278873] ? put_timespec64+0x115/0x1b0 [ 1782.283037] ? nsecs_to_jiffies+0x30/0x30 [ 1782.287275] ? vmacache_update+0x114/0x140 [ 1782.291502] ? do_syscall_64+0x8c/0x800 [ 1782.295500] ? do_syscall_64+0x8c/0x800 [ 1782.299463] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1782.304095] ? trace_hardirqs_on+0xbd/0x310 [ 1782.308411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.313968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1782.319323] ? trace_hardirqs_off_caller+0x300/0x300 [ 1782.324511] __x64_sys_clone+0xbf/0x150 [ 1782.328483] do_syscall_64+0x1a3/0x800 [ 1782.332354] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1782.337419] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1782.342442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1782.347349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1782.352624] RIP: 0033:0x45666a [ 1782.356341] Code: ff 48 8b 54 24 28 e9 ad fe ff ff 8b 9c 24 88 00 00 00 e9 6f ff ff ff 48 8b 6c 24 70 48 83 c4 78 c3 48 8b 6c 24 70 48 83 c4 78 e8 30 38 fd ff 0f 0b e8 09 39 fd ff 0f 0b e8 d2 38 00 00 e9 8d [ 1782.375286] RSP: 002b:00007ffcafb1a150 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1782.382979] RAX: ffffffffffffffda RBX: 00007ffcafb1a150 RCX: 000000000045666a [ 1782.390339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1782.397649] RBP: 00007ffcafb1a190 R08: 0000000000000001 R09: 0000000001f53940 [ 1782.404965] R10: 0000000001f53c10 R11: 0000000000000246 R12: 0000000000000001 [ 1782.412221] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000003 [ 1782.419589] INFO: task syz-executor4:31605 blocked for more than 140 seconds. [ 1782.426897] Not tainted 5.0.0-rc3+ #44 [ 1782.431296] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1782.439332] syz-executor4 D20440 31605 1 0x00000004 [ 1782.444996] Call Trace: [ 1782.447572] __schedule+0x897/0x1e60 [ 1782.451287] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1782.456395] ? mark_held_locks+0xb1/0x100 [ 1782.460582] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1782.465467] ? mark_held_locks+0xb1/0x100 [ 1782.469603] ? _raw_spin_unlock_irq+0x28/0x90 [ 1782.474154] schedule+0xfe/0x350 [ 1782.477619] ? kasan_check_read+0x11/0x20 [ 1782.481750] ? __schedule+0x1e60/0x1e60 [ 1782.486294] ? trace_hardirqs_off_caller+0x300/0x300 [ 1782.491411] ? do_raw_spin_trylock+0x270/0x270 [ 1782.496113] ? mark_held_locks+0x100/0x100 [ 1782.500374] rwsem_down_read_failed+0x360/0x6d0 [ 1782.505134] ? rt_mutex_futex_unlock+0x120/0x120 [ 1782.509899] ? lock_downgrade+0x910/0x910 [ 1782.514133] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1782.519417] ? rcuwait_wake_up+0x1c8/0x300 [ 1782.523713] ? check_preemption_disabled+0x48/0x290 [ 1782.528742] call_rwsem_down_read_failed+0x18/0x30 [ 1782.533747] __percpu_down_read+0x142/0x1d0 [ 1782.538081] ? percpu_free_rwsem+0xa0/0xa0 [ 1782.542323] ? rcu_read_lock_sched_held+0x110/0x130 [ 1782.547388] uprobe_start_dup_mmap+0xbf/0xe0 [ 1782.551813] copy_process+0x3041/0x8710 [ 1782.555841] ? page_swapcount+0x1c0/0x1c0 [ 1782.560118] ? _raw_spin_unlock_irq+0x28/0x90 [ 1782.564753] ? __cleanup_sighand+0x70/0x70 [ 1782.568983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.574572] ? debug_smp_processor_id+0x1c/0x20 [ 1782.579241] ? perf_trace_lock+0x12f/0x750 [ 1782.583675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.589204] ? reuse_swap_page+0x453/0x14a0 [ 1782.593582] ? swp_swapcount+0x540/0x540 [ 1782.597637] ? debug_smp_processor_id+0x1c/0x20 [ 1782.602459] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1782.608043] ? __lock_acquire+0x572/0x4a30 [ 1782.612266] ? do_raw_spin_trylock+0x270/0x270 [ 1782.617433] ? mark_held_locks+0x100/0x100 [ 1782.621672] ? check_preemption_disabled+0x48/0x290 [ 1782.626735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.632395] ? check_preemption_disabled+0x48/0x290 [ 1782.637473] ? debug_smp_processor_id+0x1c/0x20 [ 1782.642263] ? perf_trace_lock+0x12f/0x750 [ 1782.646538] ? add_lock_to_list.isra.0+0x450/0x450 [ 1782.651472] ? __might_fault+0x12b/0x1e0 [ 1782.655576] ? find_held_lock+0x35/0x120 [ 1782.659927] ? __might_fault+0x12b/0x1e0 [ 1782.664022] ? lock_acquire+0x1db/0x570 [ 1782.668015] ? lock_downgrade+0x910/0x910 [ 1782.672167] ? lock_release+0xc40/0xc40 [ 1782.676315] _do_fork+0x1a9/0x1170 [ 1782.679959] ? fork_idle+0x1d0/0x1d0 [ 1782.683823] ? kasan_check_read+0x11/0x20 [ 1782.687959] ? _copy_to_user+0xc9/0x120 [ 1782.691915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1782.697486] ? put_timespec64+0x115/0x1b0 [ 1782.701705] ? nsecs_to_jiffies+0x30/0x30 [ 1782.705887] ? vmacache_update+0x114/0x140 [ 1782.710119] ? do_syscall_64+0x8c/0x800 [ 1782.714167] ? do_syscall_64+0x8c/0x800 [ 1782.718128] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1782.722699] ? trace_hardirqs_on+0xbd/0x310 [ 1782.727135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.732697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1782.738118] ? trace_hardirqs_off_caller+0x300/0x300 [ 1782.743772] __x64_sys_clone+0xbf/0x150 [ 1782.747733] do_syscall_64+0x1a3/0x800 [ 1782.751602] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1782.756583] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1782.761614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1782.766519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1782.771701] RIP: 0033:0x45666a [ 1782.774963] Code: ff 48 8b 54 24 28 e9 ad fe ff ff 8b 9c 24 88 00 00 00 e9 6f ff ff ff 48 8b 6c 24 70 48 83 c4 78 c3 48 8b 6c 24 70 48 83 c4 78 e8 30 38 fd ff 0f 0b e8 09 39 fd ff 0f 0b e8 d2 38 00 00 e9 8d [ 1782.793926] RSP: 002b:00007fffed03fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1782.801641] RAX: ffffffffffffffda RBX: 00007fffed03fc00 RCX: 000000000045666a [ 1782.808970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1782.816290] RBP: 00007fffed03fc40 R08: 0000000000000001 R09: 0000000000b8d940 [ 1782.823604] R10: 0000000000b8dc10 R11: 0000000000000246 R12: 0000000000000001 [ 1782.830863] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000004 [ 1782.838257] INFO: task udevd:454 blocked for more than 140 seconds. [ 1782.844700] Not tainted 5.0.0-rc3+ #44 [ 1782.849088] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1782.857107] udevd D24136 454 3867 0x00000000 [ 1782.862798] Call Trace: [ 1782.865422] __schedule+0x897/0x1e60 [ 1782.869238] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1782.874884] ? mark_held_locks+0xb1/0x100 [ 1782.879032] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1782.883924] ? mark_held_locks+0xb1/0x100 [ 1782.888181] ? _raw_spin_unlock_irq+0x28/0x90 [ 1782.892660] schedule+0xfe/0x350 [ 1782.896106] ? kasan_check_read+0x11/0x20 [ 1782.900253] ? __schedule+0x1e60/0x1e60 [ 1782.904365] ? trace_hardirqs_off_caller+0x300/0x300 [ 1782.909488] ? do_raw_spin_trylock+0x270/0x270 [ 1782.914147] ? mark_held_locks+0x100/0x100 [ 1782.918392] rwsem_down_read_failed+0x360/0x6d0 [ 1782.923049] ? rt_mutex_futex_unlock+0x120/0x120 [ 1782.927854] ? lock_downgrade+0x910/0x910 [ 1782.931993] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1782.937329] ? rcuwait_wake_up+0x1c8/0x300 [ 1782.941565] ? check_preemption_disabled+0x48/0x290 [ 1782.946618] call_rwsem_down_read_failed+0x18/0x30 [ 1782.951534] __percpu_down_read+0x142/0x1d0 [ 1782.955893] ? percpu_free_rwsem+0xa0/0xa0 [ 1782.960115] ? rcu_read_lock_sched_held+0x110/0x130 [ 1782.965192] uprobe_start_dup_mmap+0xbf/0xe0 [ 1782.969607] copy_process+0x3041/0x8710 [ 1782.973688] ? is_bpf_text_address+0xac/0x170 [ 1782.978285] ? find_held_lock+0x35/0x120 [ 1782.982418] ? is_bpf_text_address+0xac/0x170 [ 1782.987141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1782.992731] ? __cleanup_sighand+0x70/0x70 [ 1782.997019] ? print_usage_bug+0xd0/0xd0 [ 1783.001105] ? unwind_get_return_address+0x61/0xa0 [ 1783.006669] ? create_pipe_files+0x478/0x730 [ 1783.011108] ? __do_pipe_flags+0x48/0x250 [ 1783.015296] ? print_usage_bug+0xd0/0xd0 [ 1783.019406] ? mark_held_locks+0x100/0x100 [ 1783.023716] ? __lock_acquire+0x572/0x4a30 [ 1783.028105] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.033026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.038664] ? check_preemption_disabled+0x48/0x290 [ 1783.043722] ? debug_smp_processor_id+0x1c/0x20 [ 1783.048380] ? perf_trace_lock+0x12f/0x750 [ 1783.052613] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.057744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.063354] ? check_preemption_disabled+0x48/0x290 [ 1783.068372] ? __fd_install+0x2a0/0x8c0 [ 1783.072413] ? find_held_lock+0x35/0x120 [ 1783.076592] ? __fd_install+0x2a0/0x8c0 [ 1783.080563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.086195] ? lock_downgrade+0x910/0x910 [ 1783.090347] ? kasan_check_read+0x11/0x20 [ 1783.094577] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1783.099973] ? rcu_softirq_qs+0x20/0x20 [ 1783.104032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.109622] _do_fork+0x1a9/0x1170 [ 1783.113210] ? fork_idle+0x1d0/0x1d0 [ 1783.116924] ? fd_install+0x4d/0x60 [ 1783.120534] ? do_syscall_64+0x8c/0x800 [ 1783.124539] ? do_syscall_64+0x8c/0x800 [ 1783.128516] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1783.133645] ? trace_hardirqs_on+0xbd/0x310 [ 1783.137959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.143347] ? trace_hardirqs_off_caller+0x300/0x300 [ 1783.148444] __x64_sys_clone+0xbf/0x150 [ 1783.152418] do_syscall_64+0x1a3/0x800 [ 1783.157530] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1783.162569] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1783.167651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.172512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.177796] RIP: 0033:0x7f1c0cdcaf46 [ 1783.181542] Code: Bad RIP value. [ 1783.184960] RSP: 002b:00007fff2e705830 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1783.192674] RAX: ffffffffffffffda RBX: 00007fff2e705830 RCX: 00007f1c0cdcaf46 [ 1783.200008] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1783.207343] RBP: 00007fff2e705890 R08: 00000000000001c6 R09: 00000000000001c6 [ 1783.214680] R10: 00007f1c0d6e7a70 R11: 0000000000000246 R12: 0000000000000000 [ 1783.221985] R13: 00007fff2e705850 R14: 0000000000000005 R15: 0000000000000005 [ 1783.229340] INFO: task udevd:745 blocked for more than 140 seconds. [ 1783.235973] Not tainted 5.0.0-rc3+ #44 [ 1783.240377] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1783.248413] udevd D23832 745 3867 0x00000000 [ 1783.254155] Call Trace: [ 1783.256749] __schedule+0x897/0x1e60 [ 1783.260463] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1783.266651] ? mark_held_locks+0xb1/0x100 [ 1783.270821] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1783.275742] ? mark_held_locks+0xb1/0x100 [ 1783.279902] ? _raw_spin_unlock_irq+0x28/0x90 [ 1783.284485] schedule+0xfe/0x350 [ 1783.287878] ? kasan_check_read+0x11/0x20 [ 1783.292036] ? __schedule+0x1e60/0x1e60 [ 1783.296104] ? trace_hardirqs_off_caller+0x300/0x300 [ 1783.301221] ? do_raw_spin_trylock+0x270/0x270 [ 1783.305880] ? mark_held_locks+0x100/0x100 [ 1783.310122] rwsem_down_read_failed+0x360/0x6d0 [ 1783.314874] ? rt_mutex_futex_unlock+0x120/0x120 [ 1783.319648] ? lock_downgrade+0x910/0x910 [ 1783.323856] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1783.329165] ? rcuwait_wake_up+0x1c8/0x300 [ 1783.333500] ? check_preemption_disabled+0x48/0x290 [ 1783.338535] call_rwsem_down_read_failed+0x18/0x30 [ 1783.343557] __percpu_down_read+0x142/0x1d0 [ 1783.347888] ? percpu_free_rwsem+0xa0/0xa0 [ 1783.352135] ? rcu_read_lock_sched_held+0x110/0x130 [ 1783.357234] uprobe_start_dup_mmap+0xbf/0xe0 [ 1783.361646] copy_process+0x3041/0x8710 [ 1783.365688] ? is_bpf_text_address+0xac/0x170 [ 1783.370216] ? find_held_lock+0x35/0x120 [ 1783.374345] ? is_bpf_text_address+0xac/0x170 [ 1783.378852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.384472] ? __cleanup_sighand+0x70/0x70 [ 1783.388721] ? print_usage_bug+0xd0/0xd0 [ 1783.392810] ? unwind_get_return_address+0x61/0xa0 [ 1783.398661] ? create_pipe_files+0x478/0x730 [ 1783.403133] ? __do_pipe_flags+0x48/0x250 [ 1783.407299] ? print_usage_bug+0xd0/0xd0 [ 1783.411392] ? mark_held_locks+0x100/0x100 [ 1783.415698] ? __lock_acquire+0x572/0x4a30 [ 1783.419945] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.424949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.430500] ? check_preemption_disabled+0x48/0x290 [ 1783.435599] ? debug_smp_processor_id+0x1c/0x20 [ 1783.440275] ? perf_trace_lock+0x12f/0x750 [ 1783.444582] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.449517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.455128] ? check_preemption_disabled+0x48/0x290 [ 1783.460150] ? __fd_install+0x2a0/0x8c0 [ 1783.464187] ? find_held_lock+0x35/0x120 [ 1783.468263] ? __fd_install+0x2a0/0x8c0 [ 1783.472248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.477924] ? lock_downgrade+0x910/0x910 [ 1783.482085] ? kasan_check_read+0x11/0x20 [ 1783.486285] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1783.491564] ? rcu_softirq_qs+0x20/0x20 [ 1783.495647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.501209] _do_fork+0x1a9/0x1170 [ 1783.504817] ? fork_idle+0x1d0/0x1d0 [ 1783.508556] ? fd_install+0x4d/0x60 [ 1783.512209] ? do_syscall_64+0x8c/0x800 [ 1783.516250] ? do_syscall_64+0x8c/0x800 [ 1783.520236] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1783.525936] ? trace_hardirqs_on+0xbd/0x310 [ 1783.530277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.535713] ? trace_hardirqs_off_caller+0x300/0x300 [ 1783.540823] __x64_sys_clone+0xbf/0x150 [ 1783.544868] do_syscall_64+0x1a3/0x800 [ 1783.548772] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1783.553807] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1783.558834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.563781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.568997] RIP: 0033:0x7f1c0cdcaf46 [ 1783.572721] Code: Bad RIP value. [ 1783.576149] RSP: 002b:00007fff2e705830 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1783.583931] RAX: ffffffffffffffda RBX: 00007fff2e705830 RCX: 00007f1c0cdcaf46 [ 1783.591202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1783.598555] RBP: 00007fff2e705890 R08: 00000000000002e9 R09: 00000000000002e9 [ 1783.605861] R10: 00007f1c0d6e7a70 R11: 0000000000000246 R12: 0000000000000000 [ 1783.613224] R13: 00007fff2e705850 R14: 0000000000000005 R15: 0000000000000005 [ 1783.620640] INFO: task syz-executor5:1532 blocked for more than 140 seconds. [ 1783.627945] Not tainted 5.0.0-rc3+ #44 [ 1783.632350] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1783.640572] syz-executor5 D22840 1532 31604 0x00000004 [ 1783.646259] Call Trace: [ 1783.648854] __schedule+0x897/0x1e60 [ 1783.652570] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1783.658275] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1783.663351] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1783.668305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1783.673358] ? retint_kernel+0x2d/0x2d [ 1783.677264] schedule+0xfe/0x350 [ 1783.680638] ? __schedule+0x1e60/0x1e60 [ 1783.684663] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 1783.689537] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1783.694685] ? find_next_bit+0x107/0x130 [ 1783.698764] percpu_down_write+0x430/0x540 [ 1783.703070] ? __percpu_down_read+0x1d0/0x1d0 [ 1783.707577] ? __uprobe_register+0x4fc/0x8e0 [ 1783.711987] ? find_held_lock+0x35/0x120 [ 1783.716153] ? __uprobe_register+0x4fc/0x8e0 [ 1783.720612] ? lock_acquire+0x1db/0x570 [ 1783.724646] register_for_each_vma+0x99/0xef0 [ 1783.729168] ? set_orig_insn+0x60/0x60 [ 1783.733108] ? up_write+0x7b/0x230 [ 1783.736696] ? down_write_nested+0x130/0x130 [ 1783.741120] ? down_read+0x120/0x120 [ 1783.744895] ? __alloc_pages_nodemask+0x8d5/0xdc0 [ 1783.749772] __uprobe_register+0x507/0x8e0 [ 1783.754086] ? uprobe_unregister+0x80/0x80 [ 1783.758332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1783.763410] uprobe_register+0x28/0x30 [ 1783.767312] probe_event_enable+0x62d/0xf20 [ 1783.771636] ? mark_held_locks+0xb1/0x100 [ 1783.775871] ? __uprobe_perf_filter.part.0+0x110/0x110 [ 1783.781152] ? __uprobe_trace_func.isra.0+0x860/0x860 [ 1783.787515] ? retint_kernel+0x2d/0x2d [ 1783.791420] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1783.796479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1783.801264] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1783.806785] trace_uprobe_register+0x69b/0xcf0 [ 1783.811373] ? process_fetch_insn+0x1190/0x1190 [ 1783.816122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1783.821148] ? find_next_bit+0x107/0x130 [ 1783.825287] perf_trace_event_init+0x500/0x990 [ 1783.829893] perf_uprobe_init+0x1db/0x290 [ 1783.834119] perf_uprobe_event_init+0x106/0x1a0 [ 1783.838813] perf_try_init_event+0x137/0x2f0 [ 1783.843289] perf_event_alloc.part.0+0x20bf/0x3520 [ 1783.848248] ? __perf_event_read+0x1030/0x1030 [ 1783.852904] ? debug_smp_processor_id+0x1c/0x20 [ 1783.857588] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.862521] ? add_lock_to_list.isra.0+0x450/0x450 [ 1783.867508] ? ptrace_may_access+0x3b/0x60 [ 1783.871754] ? find_held_lock+0x35/0x120 [ 1783.875876] ? ptrace_may_access+0x3b/0x60 [ 1783.880126] ? lock_acquire+0x1db/0x570 [ 1783.884189] ? kasan_check_read+0x11/0x20 [ 1783.888352] ? do_raw_spin_unlock+0xa0/0x330 [ 1783.892833] ? do_raw_spin_trylock+0x270/0x270 [ 1783.897450] ? rcu_read_unlock_special+0x380/0x380 [ 1783.902404] __do_sys_perf_event_open+0xbb5/0x2f00 [ 1783.907432] ? perf_event_set_output+0x600/0x600 [ 1783.912212] ? kasan_check_read+0x11/0x20 [ 1783.917524] ? do_syscall_64+0x8c/0x800 [ 1783.921538] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1783.926178] ? trace_hardirqs_on+0xbd/0x310 [ 1783.930519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.936128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.941505] ? trace_hardirqs_off_caller+0x300/0x300 [ 1783.946673] __x64_sys_perf_event_open+0xbe/0x150 [ 1783.951534] do_syscall_64+0x1a3/0x800 [ 1783.955523] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1783.960486] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1783.965590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1783.970462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.975728] RIP: 0033:0x458099 [ 1783.978938] Code: 01 00 00 48 89 74 24 38 48 89 7c 24 30 4c 89 44 24 28 44 88 4c 24 27 48 89 54 24 50 48 89 44 24 40 48 c7 80 f8 00 00 00 00 00 <00> 00 4c 89 90 00 01 00 00 8b 0d b8 68 23 01 4c 8d 90 f0 00 00 00 [ 1783.997879] RSP: 002b:00007f447f739c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1784.005660] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458099 [ 1784.013013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 [ 1784.020283] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1784.027600] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f447f73a6d4 [ 1784.034955] R13: 00000000004c46c5 R14: 00000000004d7cc8 R15: 00000000ffffffff [ 1784.042253] [ 1784.042253] Showing all locks held in the system: [ 1784.049817] 1 lock held by khungtaskd/1040: [ 1784.054227] #0: 000000008fd069e1 (rcu_read_lock){....}, at: debug_show_all_locks+0xc6/0x41d [ 1784.062930] 1 lock held by rsyslogd/8168: [ 1784.067076] #0: 000000001338907b (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 1784.075130] 2 locks held by getty/8290: [ 1784.079103] #0: 000000003d872735 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.087377] #1: 00000000ae533351 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.096405] 2 locks held by getty/8291: [ 1784.100399] #0: 00000000cf5103f6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.108673] #1: 00000000e7407549 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.117607] 2 locks held by getty/8292: [ 1784.121566] #0: 000000002d36e72a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.129854] #1: 0000000055b1e937 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.138781] 2 locks held by getty/8293: [ 1784.142833] #0: 00000000c248b822 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.151084] #1: 000000000febb503 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.160006] 2 locks held by getty/8294: [ 1784.164024] #0: 000000003cc7fedc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.172276] #1: 00000000a34cf781 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.182197] 2 locks held by getty/8295: [ 1784.186238] #0: 00000000fc1f921a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.194713] #1: 00000000e65b6bba (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.203682] 2 locks held by getty/8296: [ 1784.207666] #0: 0000000006c15190 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1784.215963] #1: 00000000b5be6519 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1784.224899] 1 lock held by syz-executor0/8328: [ 1784.229472] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.237685] 1 lock held by syz-executor1/8331: [ 1784.242270] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.250471] 1 lock held by syz-executor2/8334: [ 1784.255126] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.263398] 1 lock held by syz-executor1/27041: [ 1784.268162] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.276547] 1 lock held by syz-executor3/31602: [ 1784.281224] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.289433] 1 lock held by syz-executor4/31605: [ 1784.294183] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.302352] 1 lock held by udevd/454: [ 1784.307365] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.315577] 1 lock held by udevd/745: [ 1784.319360] #0: 0000000052238ee0 (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1784.327550] 5 locks held by syz-executor5/1532: [ 1784.332215] #0: 000000003eb82e21 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x9c3/0x2f00 [ 1784.342162] #1: 00000000f130c70d (&pmus_srcu){....}, at: perf_event_alloc.part.0+0x10c1/0x3520 [ 1784.351093] #2: 00000000a90b0d0a (event_mutex){+.+.}, at: perf_uprobe_init+0x1d0/0x290 [ 1784.359314] #3: 0000000007ba1e7f (&uprobe->register_rwsem){+.+.}, at: __uprobe_register+0x465/0x8e0 [ 1784.368668] #4: 0000000052238ee0 (&dup_mmap_sem){++++}, at: percpu_down_write+0x9a/0x540 [ 1784.377079] [ 1784.378707] ============================================= [ 1784.378707] [ 1784.386565] NMI backtrace for cpu 0 [ 1784.390178] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc3+ #44 [ 1784.396998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1784.406337] Call Trace: [ 1784.408906] dump_stack+0x1db/0x2d0 [ 1784.412519] ? dump_stack_print_info.cold+0x20/0x20 [ 1784.417518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1784.423042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1784.427573] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1784.432490] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1784.437754] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1784.442928] watchdog+0xbbb/0x1170 [ 1784.446477] ? reset_hung_task_detector+0xd0/0xd0 [ 1784.451312] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1784.455880] ? trace_hardirqs_on+0xbd/0x310 [ 1784.460182] ? kasan_check_read+0x11/0x20 [ 1784.464311] ? __kthread_parkme+0xc3/0x1b0 [ 1784.468528] ? trace_hardirqs_off_caller+0x300/0x300 [ 1784.473612] ? do_raw_spin_trylock+0x270/0x270 [ 1784.478190] ? schedule+0x108/0x350 [ 1784.481799] ? do_raw_spin_trylock+0x270/0x270 [ 1784.486367] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1784.491452] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1784.496976] ? __kthread_parkme+0xfb/0x1b0 [ 1784.501194] kthread+0x357/0x430 [ 1784.504541] ? reset_hung_task_detector+0xd0/0xd0 [ 1784.509362] ? kthread_stop+0x920/0x920 [ 1784.513322] ret_from_fork+0x3a/0x50 [ 1784.517144] Sending NMI from CPU 0 to CPUs 1: [ 1784.521719] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 1784.523754] Kernel panic - not syncing: hung_task: blocked tasks [ 1784.535411] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc3+ #44 [ 1784.542255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1784.551608] Call Trace: [ 1784.554192] dump_stack+0x1db/0x2d0 [ 1784.557830] ? dump_stack_print_info.cold+0x20/0x20 [ 1784.562837] panic+0x2cb/0x65c [ 1784.566012] ? add_taint.cold+0x16/0x16 [ 1784.569970] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1784.574883] ? ___preempt_schedule+0x16/0x18 [ 1784.579279] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1784.584713] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 1784.590143] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 1784.595576] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1784.601016] watchdog+0xbcc/0x1170 [ 1784.604547] ? reset_hung_task_detector+0xd0/0xd0 [ 1784.609374] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1784.613945] ? trace_hardirqs_on+0xbd/0x310 [ 1784.618249] ? kasan_check_read+0x11/0x20 [ 1784.622390] ? __kthread_parkme+0xc3/0x1b0 [ 1784.626607] ? trace_hardirqs_off_caller+0x300/0x300 [ 1784.631691] ? do_raw_spin_trylock+0x270/0x270 [ 1784.636255] ? schedule+0x108/0x350 [ 1784.639863] ? do_raw_spin_trylock+0x270/0x270 [ 1784.644434] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1784.649534] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1784.655049] ? __kthread_parkme+0xfb/0x1b0 [ 1784.659264] kthread+0x357/0x430 [ 1784.662611] ? reset_hung_task_detector+0xd0/0xd0 [ 1784.667434] ? kthread_stop+0x920/0x920 [ 1784.671399] ret_from_fork+0x3a/0x50 [ 1784.676187] Kernel Offset: disabled [ 1784.679816] Rebooting in 86400 seconds..