0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4f0) finit_module(r0, &(0x7f00000005c0)='mangle\x00', 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000600)={0xfffffffffffffff7, 0x8, 0xfffffffffffffffa}, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) 03:41:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@initdev}}, &(0x7f0000000740)=0xe8) recvfrom$packet(r0, &(0x7f0000000000)=""/243, 0xf3, 0x2, &(0x7f0000000780)={0x11, 0x1f, r1, 0x1, 0x1f}, 0x14) [ 2021.787437] audit: type=1400 audit(2000000517.189:71994): avc: denied { map } for pid=8300 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:41:58 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:41:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='attr/f\b\x00\x00\x00ate\x00\'\xf1\x8d\x9a\b\xd5,W\xa6EN\xb2H2\xef\xdcv\b\xbfx\x8f\xf63\xb5\x19vg\xa9\xc2\xa6-XF\xa3YPU\x83\xf6*=\xacJ\x9e\xa3Mr\xa6\x80\x85\x8b\xa9\xea5\xc2\xbc\xb2q\a`\x80\xbc\xdc4T\xa8\x9e5\x884~z\xfanC\x008w\xdf\x03Z\xd5-\xceh\xb9\x7fS\xe9\x8dY\f\xf8|\x02\x00\x00\x00\x00\x00\x00\x00+\x83@\xcbY\xe87\x9cD\f\fZF\x9d\x99\xceC\x9aT\xdbe^\x81\xda\xd9\xa83\x19s\xee\x02\xbf\x14\x8a \x11E\xe6\xdfdK\xe0\xe4\x99n\x1f]\xf1\xe6\x95\xd81\x9c\x93\x95\xe5\x04\xb1 F\xf9u\x83\xb9\x8c\xa1\x83G\xd4\xbcy\xb2\x93\xe3\xb5\x1f\xefi9\xff\xd5\x89\xca\xedX\xa0\xc9Cm\x95L\x00|\xd8)\xeah\xfb\x06\xfe\xd8\xa7Yi)\xac\x01B\xa0\xd9\xc3L\x03\x0e\x17-<\x03\xc9*e\xbf7\xf0\xf9\x99\xe0\xdb\xc2{\xb5\xc7_\x1c@\x13\xfc\x98~') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) r3 = getuid() sendmsg$nl_route(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b80000001900000125bd7000fcdbdf250a341400fc07ff07001d000008000400", @ANYRES32=r1, @ANYBLOB="04001b00", @ANYRES32=r2, @ANYBLOB="840016006d4125863c3b11d305b24b25fbaaaad13cd463f1f888d15af0351809c7f94cdde0ba89bfcb26158b3aaaef9ce2f47bb74e63d348774315e401e244441234480c749379281cf989a91f90ed625b5942235e3c04346a83c761576ad870595af99826084a8599d929b47ca4bcaae1ba0e167c549981760aed3d41baddd20100000008001900", @ANYRES32=r3], 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x10) 03:41:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2022.507328] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. 03:41:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:41:59 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:41:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:41:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:41:59 executing program 2: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) ioctl$FICLONE(r0, 0x40049409, r0) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)=0xffc6) [ 2023.163534] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. 03:41:59 executing program 3: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) r1 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) 03:41:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept4(r0, &(0x7f0000000180)=@nfc, &(0x7f0000000000)=0x80, 0x400000000080800) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r2 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xffffffffffffff00) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000300)={{0xff, @multicast1, 0x4e21, 0x4, 'rr\x00', 0x20, 0x4, 0x41}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x12002, 0xa4, 0x200, 0x4}}, 0x44) getsockopt$inet_int(r2, 0x0, 0xe, 0x0, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r3, &(0x7f000003bfff)='/', 0x1, 0x0) sendfile(r3, r3, &(0x7f0000000440), 0x20) sendfile(r3, r3, &(0x7f0000000100), 0x5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r4, r5, 0x0, 0x8000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x82) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f00000002c0)=0x1e) 03:41:59 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 03:42:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x2) 03:42:00 executing program 2: r0 = socket$inet(0x2, 0x100000000000000, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)) 03:42:00 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 03:42:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x40) 03:42:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:01 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 03:42:01 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x0, 0xfffffffffffffffd, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) 03:42:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:01 executing program 2: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) write(r0, &(0x7f00000003c0)="26bec99daf272ae4bfcdc39b8a7c2f44b000a08f0baff3c628a3cb01f5d22e1c0579bc11aaab10e059808c20a7d91f256e4d1a01c83ccf8153c4782080ad33c2654d96895817c4d58457b6e48e49afd18af5e31d0a6aec92a3b1c16a306e3d4b99b370330a551d1f58eea5d5c0341b46999d0e5218133c7d8a845602e2b201ef6c3efa35934bdd4ea1afa91d530f3e8ef119e486fc0d5f18f7ec0e57e559829400b5d3885888862d52f3a20422505f19f8f281e0156e0b1c53ddb85059529a1c63ed15e59cc2e059ab338292256075dc3ad0d581f1bb3245b45cd87108933efeb9369782b12b4732e7e8f0a68fd0d57a102df8e5bb46cb5c0d3bf1f291b3a19c10c6b1ed5581a73954112a603524e55979707fcf133478d7c8", 0xffffffffffffffc2) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4200, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000040)) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)) 03:42:01 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:01 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) timer_create(0x5, &(0x7f0000000300)={0x0, 0x31, 0x2, @thr={&(0x7f00000001c0)="cb67398bc99d816dac798a23b6730c3abddff35e9a7c059e517a65c4c04f5bbc802bff7ffe590a44be6239c6ff32725b60dd7d0f98a1d5a389d61de7018da05c7e6b8a1d534cc766fcb643249b6518a573c8af0ab7f413ce9b3f64d68db4123bb2150d3dea26e44f2b4c08582a25521bbc569115bcf125d5ec8c4afaa63b8b50784c85", &(0x7f0000000280)="f06d410414529d30a3f09dca0ab5a55ff32d65a2671414be9cc470a229e7999bbe8048b4d6e4fd3b6027a888d80c4c98218fea2bd97a085e7f385af1f687449187ee92ec5998cfc3174918a6650f570483a80ca25a3ea23d7da1fff5f146d594f429808e71e7f5d8dc9e51bda628f8b137151fa6"}}, &(0x7f0000000340)=0x0) timer_getoverrun(r1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) recvmmsg(r0, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000380)='bond_slave_1\x00') ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) 03:42:01 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) getpgrp(0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='oom_adj\x00') read(r1, 0x0, 0x0) ftruncate(r1, 0x10000) 03:42:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:02 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:02 executing program 2: prctl$PR_SVE_GET_VL(0x33, 0x186f3) r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x0, 0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="06002799f62e3f11855678000c0009000000"], 0x24}, 0x1, 0x0, 0x0, 0x4044090}, 0x24000050) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)) [ 2025.685145] kauditd_printk_skb: 196 callbacks suppressed [ 2025.685154] audit: type=1400 audit(2000000522.099:72191): avc: denied { map } for pid=8439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:02 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:02 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff26, 0x10000, 0x0, 0xffffffce) recvmmsg(r0, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) [ 2025.917890] audit: type=1400 audit(2000000522.169:72192): avc: denied { map } for pid=8439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.001664] audit: type=1400 audit(2000000522.169:72193): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.170926] audit: type=1400 audit(2000000522.169:72194): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:02 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/212, 0xd4}, {&(0x7f0000000180)=""/122, 0x7a}, {&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/17, 0x11}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000380)=""/163, 0xa3}, {&(0x7f0000000440)=""/63, 0x3f}], 0x8, 0x0) 03:42:02 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2026.350120] audit: type=1400 audit(2000000522.259:72195): avc: denied { map } for pid=8439 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.470087] audit: type=1400 audit(2000000522.259:72196): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.620138] audit: type=1400 audit(2000000522.259:72197): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2026.747531] audit: type=1400 audit(2000000522.309:72198): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:03 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2026.881141] audit: type=1400 audit(2000000522.309:72199): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:03 executing program 5: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) prctl$PR_SET_SECCOMP(0x16, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000240)="f17daf185e3d74e9bc0b6140836d63a7f7bd10536a06c2739515162b6d5a7901f12352fe9ef1cd84c5fd3c1a90b0a4909189d109118b7c854019149ebcad58b5152e13cb3e3ca278c57ab13a83de96385ac45f4dd1f6b3d746b2aade609a4bf2681537708d8125f267cc67e5da619d5658354742ca356ac0f5d801e81a96e379cd84cfeeaf3e528e2c1a5dd13c06d233ba9ed98d01714719688d31b55e9d4096566a171545ec7b92f1", 0xa9, 0x4, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0xffffffff) [ 2026.968918] audit: type=1400 audit(2000000522.369:72200): avc: denied { map } for pid=8439 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:03 executing program 2: r0 = socket$inet(0x2, 0x100000000000003, 0x60) rt_sigaction(0x23, &(0x7f00000002c0)={&(0x7f0000000000)="c4c1a8c6ff5d66410fe827c422d9aa3c0ac4c125d86f01c4e1f8117e5cc44211ab72c20f9f066566460fdd7ae90fba2a32c4838579360d", {0x3}, 0x40000000, &(0x7f0000000040)="660ff602c42152522e2178c065fac4c22da9b2986fa525c4c2d59e23660f383cbc6200100000c4a3b10e0e09c4414012322e0f18d9"}, &(0x7f0000000100)={&(0x7f00000000c0)="c0ad0000008055f2f245d8e7f3460f5c0040d891729aba30f0007d00c4e1256927c421f811fbc442959fa208b40000400b6f00470fd943e1", {}, 0x0, &(0x7f0000000340)="660f38df7b0d66470fc4ec00c4a17c283d655666664528b46a0e000000c421515cb8e2ffffff653ef366f2656540dec6c402593a3f36f30fae64e546c422699b42a080e500"}, 0x8, &(0x7f0000000200)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000003c0)={0x0, 0xfb, 0x43, 0x5, 0x7fff, "06df8d0989e541606151d49e7cddc4d4", "847e4a2ec1b416cec51eb1ee2c7ee4c7f1bf0cf1db874460b30f0ff125610f0da336063e31c7704cfbf4600d7a06"}, 0x43, 0x1) 03:42:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'yam0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x10, 0x70bd27, 0x25dfdbfe, {0x0, r1, {0xffff, 0xf}, {0xfff7, 0xa}, {0x3, 0xffff}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:03 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/44) r1 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000280)) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) accept4$packet(r0, 0x0, &(0x7f0000000100), 0x80800) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0xd, 0x3, 0x701, 0x70bd25, 0x25dfdbfd, {0x2, 0x0, 0x4}, [@typed={0x14, 0x90, @ipv6=@mcast1}]}, 0x28}}, 0x24004001) 03:42:03 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:04 executing program 2: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0x7ffffffd) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSRS485(r4, 0x542f, &(0x7f00000000c0)={0x7fff, 0x10000, 0x100000000}) dup2(r3, r2) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000240)) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000100)={0x2, 0x8, 0x80000001, 0xffffffffffff8001, 0x14, 0x81, 0x6, 0x1, 0x9, 0x1, 0x9, 0x20}) 03:42:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:04 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) 03:42:04 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:04 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) getsockopt(r0, 0x4, 0x7, &(0x7f0000000180)=""/4096, &(0x7f0000000080)=0x1000) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:04 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) 03:42:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:05 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:05 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2, 0x4) recvmmsg(r0, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) 03:42:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ftruncate(r0, 0x0) 03:42:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) tee(r0, r0, 0x2, 0x9) read(r0, 0x0, 0x0) 03:42:05 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000000)="0adc1f123c03000000d070") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$TCFLSH(r2, 0x540b, 0x7fff) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000000)) 03:42:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:05 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ftruncate(r0, 0x0) [ 2029.675587] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:42:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2029.782778] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:42:06 executing program 1: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='\x9c\x9d\x96~smaps_rol_up\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$eventfd(r1, &(0x7f0000000000)=0x5, 0x8) 03:42:06 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:06 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000000)="0adc1f123c03000000d070") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$TCFLSH(r2, 0x540b, 0x7fff) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000000)) 03:42:06 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)=""/99, &(0x7f0000000040)=0x63) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140), 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3b, &(0x7f00000001c0)=0xcad6, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x3, 0x40) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'ip6gretap0\x00', 0x2}) 03:42:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ftruncate(r0, 0x0) 03:42:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:06 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 2030.495666] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:42:07 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0xa9a3422e9899840a, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 'ip6tnl0\x00'}) [ 2030.636630] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2030.713696] kauditd_printk_skb: 165 callbacks suppressed [ 2030.713706] audit: type=1400 audit(2000000527.129:72366): avc: denied { map } for pid=8563 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000000)={0x20000000}) read(r0, 0x0, 0x0) [ 2030.828610] audit: type=1400 audit(2000000527.129:72367): avc: denied { map } for pid=8567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2030.966182] audit: type=1400 audit(2000000527.139:72368): avc: denied { map } for pid=8563 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:07 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 03:42:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) [ 2031.197046] audit: type=1400 audit(2000000527.139:72369): avc: denied { map } for pid=8567 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2031.328886] audit: type=1400 audit(2000000527.159:72370): avc: denied { map } for pid=8567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x498c) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2031.448617] audit: type=1400 audit(2000000527.189:72371): avc: denied { map } for pid=8567 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2031.581851] audit: type=1400 audit(2000000527.189:72372): avc: denied { map } for pid=8563 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/149, 0x95}, {&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f0000000300)=""/215, 0xd7}], 0x3, &(0x7f0000000440)=""/116, 0x74}, 0x1ff}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000540)) 03:42:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) sched_yield() read(r0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x10001}, 0x28, 0x2) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/118}) [ 2031.794355] audit: type=1400 audit(2000000527.199:72373): avc: denied { map } for pid=8563 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) 03:42:08 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 2032.000134] audit: type=1400 audit(2000000527.249:72374): avc: denied { map } for pid=8567 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2032.158287] audit: type=1400 audit(2000000527.279:72375): avc: denied { map } for pid=8563 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000100)=""/227) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() prctl$PR_SET_FPEMU(0xa, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(r2, 0x0, 0x0, 0x0) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}}) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'user.', 'posix_acl_access\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x1) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000000c0)=0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000040)='./file0\x00', 0x0) 03:42:08 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, 0x0) 03:42:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ftruncate(r0, 0x0) 03:42:09 executing program 2: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x06\x00\x00\x00\x00\x00\x00\x00llu\xd3\x00') ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) getpeername(r1, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80) read(r1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:42:09 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, 0x0) 03:42:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:09 executing program 3: r0 = socket$inet(0x2, 0x8000b, 0x3) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x5) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x224) recvmmsg(r0, &(0x7f0000003c80), 0x4345398a295938, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) 03:42:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ftruncate(r0, 0x0) 03:42:09 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @rand_addr=0x5}, {0x307, @remote}, 0x20, {0x2, 0x4e24, @rand_addr=0x2000}, 'bcsf0\x00'}) 03:42:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/35, 0x23) 03:42:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:10 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, 0x0) 03:42:10 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0xa9a3422e9899840a, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 'ip6tnl0\x00'}) 03:42:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendto$inet6(r0, &(0x7f0000000000)="f6b59b83dac41f400be9460bc35ff7f72fe4b88dcb2ad63aba49bdf4343d99bc6d324e4dbde744530736be3d17a9", 0x2e, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @remote, 0x7f}, 0x1c) ftruncate(r0, 0x0) 03:42:10 executing program 1: r0 = socket$inet(0x2, 0x0, 0x7fffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/160) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 03:42:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) 03:42:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) 03:42:10 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) 03:42:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:10 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0xa9a3422e9899840a, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 'ip6tnl0\x00'}) 03:42:10 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0), 0x10) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000000)="15bf3731df6e04655db8b41f1221a01f4775730df7f25760e5f362b3d2d969cae7c58a3acec6219ce9e150793e02da3b00ccc7ca7af9e5d0843642fae5ce9cbc19f7fc51f03b7c34f2899df5176f84f36f875796a009ff083004d815d20cb11c6b19f322e5ca90441d734fbe30dfb0906ca2be22fe4537d14cb2d83c2da5d9032b90939dca7266b10ea0c8f9591b75f45eea81b8eed84ccee2f6c0bf", 0x9c) 03:42:11 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) 03:42:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') pwrite64(r0, &(0x7f0000000180)="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", 0x1000, 0x0) r1 = socket$inet6(0xa, 0x80005, 0x40c) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x101000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000008000800030002000000", 0x24}], 0x1}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000001240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200006}, 0xc, &(0x7f00000000c0)={&(0x7f0000001180)={0x9c, r4, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x74d}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x44) read(r0, 0x0, 0x0) dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000001280)=0xffffffffffffffff, 0x4) 03:42:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:11 executing program 5: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:42:11 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @loopback}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0xa9a3422e9899840a, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 'ip6tnl0\x00'}) 03:42:11 executing program 1: r0 = socket$inet(0x2, 0x100000000000002, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)=0x304) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:42:11 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) 03:42:11 executing program 5: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:42:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2035.738284] kauditd_printk_skb: 181 callbacks suppressed [ 2035.738293] audit: type=1400 audit(2000000532.149:72557): avc: denied { map } for pid=8698 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r3 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="dd88d34c021875c97034bb9f4f2ff518027c4acfbef7581b21ed0cc79c2d11fcce0d399a4597fdcd21f2ffe87200f5bb6abbe670b3f8dc0ee7c92d964779b11321333054b43446ca702324f48f4683f8b06b3f66471dd073f4a4bdfa7416e25d3d5d65304698acb0b583b392fca7e26947c3970bbfbfe8f24fff581219bb918d8e97702eab713a5422398ff0231d38c23e2d1f3c734a7571781363aaedc8ffeb85d0ce7a9ff02caec471862349d483c24f06eecd", 0xb4, 0xfffffffffffffffc) keyctl$negate(0xd, r2, 0x460, r3) fcntl$setstatus(r0, 0x4, 0x2800) [ 2035.917996] audit: type=1400 audit(2000000532.169:72558): avc: denied { map } for pid=8698 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.058271] audit: type=1400 audit(2000000532.209:72559): avc: denied { map } for pid=8698 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.187016] audit: type=1400 audit(2000000532.219:72560): avc: denied { map } for pid=8694 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:12 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000180)=""/4096) 03:42:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:12 executing program 5: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 2036.367890] audit: type=1400 audit(2000000532.229:72561): avc: denied { map } for pid=8694 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.521699] audit: type=1400 audit(2000000532.249:72562): avc: denied { map } for pid=8698 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0), 0x4) 03:42:13 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80002, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) r2 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r2, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2036.720658] audit: type=1400 audit(2000000532.259:72563): avc: denied { map } for pid=8698 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2036.886955] audit: type=1400 audit(2000000532.279:72564): avc: denied { map } for pid=8694 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:13 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2037.064923] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:13 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) [ 2037.106015] audit: type=1400 audit(2000000532.299:72565): avc: denied { map } for pid=8694 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) gettid() r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000400)='net/raw\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r3, 0x0, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/mnt\x00') 03:42:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x4000000000000, 0x69bd, 0xa4, 0xfffffffffffffc0f, 0x8000, 0x3, 0x3, 0x5, 0x14d, 0x40, 0x27e, 0xa, 0x7f, 0x38, 0x1, 0x8, 0x20, 0x40007}, [{0x70000003, 0x1, 0x1, 0x80, 0x9, 0x1000, 0x3, 0x7fffffff}], "f60223d98bdc2c478348182d6b55d85ff2af4b2457d37adeedd4be10b1fa52cba35119ac55b59df272e1544ec8d75615e87fd62b7fa0680d64889cabb94fab9da0dff63a3567e9e07a4e1b8ca7eb88705f58a5bde62eafb3953a0794d0bf12e4fded1a3be4a8fe11ad69c6b31177229ca1a12285b9a61c5f32f0ac5074e607ef3bfe42284a6e66243be8dd055593c41e179e119fdd01da1b7c1b9fd1960ff294656f038686ea97195c3c0ca1c9b41d6e35af1c4afabde4279aea33142817f1e98bc6a1e1940c58284bce4e18060bf72a22893cafc5887b929b74a78b26ead1db95b38e0a9b898e", [[], [], [], []]}, 0xfd62) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = fcntl$dupfd(r1, 0x406, r0) write$P9_RFLUSH(r2, &(0x7f00000005c0)={0x7, 0x6d, 0x1}, 0x7) fcntl$setstatus(r1, 0x4, 0x2800) 03:42:13 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) sendto$inet(r0, &(0x7f0000000000)="5c17b75aa0825c78e5b4d432eefe60f167d94f21219de8b5b2ed4e68823ed49cdb7be8b1e37f8e9e41c1a593341d2651e88b", 0x32, 0x84, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socket$inet(0x2, 0x1, 0x20) 03:42:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:14 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:14 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='attr/h\xc1zb\x8f\xc8\x11\x1f\xa5\xe7\xd2v\x8ek#ycurrent\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:14 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) 03:42:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r1, r0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}], {0x4, 0x3}, [{0x8, 0x7, r5}, {0x8, 0x0, r6}, {0x8, 0x7, r7}], {}, {0x20, 0x5}}, 0x44, 0x2) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x26, 0x37, 0x1, {0x1, 0x1ff, 0x2, r3, 0x8, 'trusted\x9e'}}, 0x26) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$TIOCGPTPEER(r0, 0x5441, 0xaa) 03:42:14 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:15 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(r0, 0x0) 03:42:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:15 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) fallocate(r0, 0x21, 0x101, 0x9ab) 03:42:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 03:42:15 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:42:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6, 0x1000}, 0x4) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) fcntl$setstatus(r1, 0x4, 0x2400) 03:42:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:16 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:16 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f00000000c0)={{r2, r3+10000000}, {0x0, 0x989680}}, &(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @multicast1}, 0x10) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:42:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/186) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r1}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000480)=0x4) write$P9_RFSYNC(r0, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) read(r0, 0x0, 0x0) finit_module(r0, &(0x7f0000000440)='vmnet0#losecurityem1&vboxnet0$]\x00', 0x2) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000200)="b20ba5a0bd683354f7f5e87a9036418b7a66b18a54a5174885723605d2e35077d68d5803b76ba6", 0x27}, {&(0x7f0000000240)="d585143c26cc4d579cbc6d86019e896ed8a8e776b04793781648c02dcb655d7a2ded44b6fc7817457ee2a18175d2f6f979e2c977b14c7c4d8b0829b636cc266ae794dcf949dfd14707217f3ca7e0b35f1bfad99e83266ae653e2d615a19b531f02eadafe1b9550f50671b5c0060353bfb2949118e53ec3cde8cfefeba82153444d8a35d1d12021e0f45171aa97e826e3d6551204e308c0d11b3df55953bac807771efe9e28e61a3854be51b2ce63cf3561", 0xb1}, {&(0x7f0000000300)="fc00b0f72b524d389a1c7a25beb3ebdf3e3990d2a462a7d561b3ae50eb7447e504e9c5248c2668b1cddd55aa8fedd4a90258da793c2185040907611d0e21960d3c4747ef6d167d96314b07c8418741a4e208a67e07c3bb31b2026f9203c072894eee81febff9eb0bb9bc4a42003a393586277ed911d1462f3ad1410d89aa", 0x7e}], 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0867397dcba259296130da112dfb0575c7473392c4f6f06500c0400003076418e7be887a64f198f6d7a1a25b0f80dd6e2756b1c8e9f9e3e989e5e9ae8c6aa2a1ca17a57fd84679386846f69f2e9e99241cf69052f6bb011b2d78166194a44ce7851d2e830d387a8e622dda403ea527310a3953177165c3832247ace39798432c62a881ae02fe58f63ca4144cfbc3ed5bed19f588b9bd89b17df2def2e3fe32e2b019f5feca2b1f70258fe2fae53543272f1dd89c40506839f8e28f259ed3ecfcfdc5fe8a6026ba5607c57adcbe10aea3512d750131f"], 0x20, 0xd1}, 0x4800) 03:42:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:42:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) recvfrom$unix(r2, &(0x7f00000000c0)=""/59, 0x3b, 0x1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x200) 03:42:16 executing program 1: syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0xffffffffffffff81, 0x410002) r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x4800000000000) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c653020205e6e6f646576200a3c7b60842caac4f1b6625e3b0da943ab2bda6e3ec6612db743a690eb1bdba43680d8af30432ff5c4784b34c98da611df0218c883860c5b44891de3d0dafbfcd9f56413f333a650cbdd00008d9fe27af5d026773f97cfe690f033015c6942680173a1bcd757c71e50a63229b51beb27d364ecb739f980c6f8922dc678f0c51a5a8a915740629bb31b8d1df48abcf782fa2e1bc06d260d4b578aa227cc42cd1b0a0d656e6b692e1732"], 0x6b) 03:42:16 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='io\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@rand_addr="55a80c5c075d94ce140ab991712189b7", 0x80, r1}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:42:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2040.744551] kauditd_printk_skb: 233 callbacks suppressed [ 2040.744560] audit: type=1400 audit(2000000537.149:72764): avc: denied { map } for pid=8835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1f) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000380)={0x8}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x124}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x9c, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$TIOCEXCL(r1, 0x540c) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400, 0x0) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f00000000c0)) r4 = socket$inet(0x2, 0x100000000000003, 0x60) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000180)={{0x33, @loopback, 0x4e24, 0x1, 'wlc\x00', 0x0, 0x9, 0x62}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x0, 0x4, 0x0, 0x6}}, 0x44) getsockopt$inet_mreqsrc(r0, 0x0, 0xcfe3a93b37fb87a9, &(0x7f00000002c0)={@loopback, @multicast2, @local}, &(0x7f0000000300)=0xc) getsockopt$inet_int(r4, 0x0, 0x12, 0x0, &(0x7f0000000100)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000240)='/selinux/status\x00', 0x10, 0x2) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETS2(r5, 0x402c542b, &(0x7f0000000280)={0x1, 0x7fffffff, 0x300000000, 0xffff, 0xffffffffffffffe1, "9919b8d5e513684bb926113b8ced08399563dd", 0xa211, 0x7d1e}) [ 2040.950116] audit: type=1400 audit(2000000537.199:72765): avc: denied { map } for pid=8835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x57, 0x4, 0x6, {0x4, 0x40}, {0x7, 0x1181}, @const={0x20, {0x1, 0xb1e0, 0x7f, 0x9fe3}}}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000200)=0x1) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) pipe(&(0x7f0000000180)) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) 03:42:17 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2041.075440] audit: type=1400 audit(2000000537.199:72766): avc: denied { map } for pid=8834 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2041.221267] audit: type=1400 audit(2000000537.219:72767): avc: denied { map } for pid=8834 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) [ 2041.343107] audit: type=1400 audit(2000000537.229:72768): avc: denied { map } for pid=8835 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:17 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2041.488160] audit: type=1400 audit(2000000537.239:72769): avc: denied { map } for pid=8835 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ecffffff00000000e000000100000000ac141415fffffffae77fa9608574a2d345ad29e6786b93fff0ae142df91d74d22e3edd12a60895040c8d90aff31b44bd19e426cff342625c8ed9802f7745016175b0850bf568ad2841"], 0x0) r1 = dup3(r0, r0, 0x80000) sendmsg$nl_netfilter(r1, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000180)={0x1128, 0x12, 0x5, 0x100, 0x70bd2c, 0x25dfdbff, {0xf, 0x0, 0x3}, [@generic="500c681c1b72a63aa77106f8a8465d5a625f39613598752fb6ed8ce4c838bb68c1e03f7fef504a6917244b1ca057f767b37efee4e1e2df8baf732fcd9a41ab6d0d0b59e7148912fe4b2d948470e6b04ed39419c94a555a1f5cd5", @generic="d6cc9a8921f4a7a7f5d0e0a65d5b5df9fcec7e59c4f5739ad5e38b58735b6ee10cecb9af233e1b231f6ef1dafad8d35f0b32cba975f529aec5d2986bcd283b126bea33ecc8ecbef9db9014956da60de19f444642253a1c3d1645f30334a4f04440719a643227f5484cbebd8b5844b637538c99858da820a370656d215ae6e3c1e7cd8e68ccf601fe4115867e67a0df3eccf32ab3e7d46d72984b3e9882625a7a010f37de326d3e93c04c9216566f2574508f74c4b2", @typed={0x4, 0x2b, @binary}, @generic="b76ee7bd54ea1faca6d16e60759816042725a9670ac8d0ae22d8529aacb3b989664d45f7c1f4e5a869da2fd908ca9d6ffef429b65b9db45c8644dc4eb4eefdac51a08f6e27ad1a3e5513a29039ecfc06fa6adf054f0ef7ce49ec9c5651a2785e2ba2acb781c9680517a2503779530be8f11df94a7c90f12f412902b60cec780e2c9bd36baaa52498228cb39f550a982b133ad4a65e9114dad2a556a84352015999212d0ceccc530f8d7c969b04872c01f1274b8512fe2fcc671e11cce7897d01b67ffdf83b1f931e7a9b1b775ab6f026aaa10ed58c050bcfa6367282e49d58b01afaa72a36ca0172cb6d10c863bbefb29442d49a1a67d50ed7c192246a3874e9f16f193bd2db06f2fc5127632d387c7a1b7795aea03058b85c51b4a551abb3744e740765557f40c1604918745b3a177558e4947179b8c95779e9bce50fe919f7c00b5c46d1cd44ef04f74ad4f7fa4b570eb1daf1a3c0234af5429f865972a765c8daa95ef4a05960e66e37b9f7a999df12aaa0919864a9f3b58ad21ed1bbfe79f5fd76e15f06a2ef7a6ebd8626f29cc7e1c1b59cb6ffff44f5f8ce41552bd733b4352e7c4e5461f5813000b3a23f3f80b25e16a0a6c2afde6801d7047c1074e5b0156667a8326c21a661f6e52bf2bc48aa2b7526a601f22c8a47c45789c6a12412728dccce67961f6514dc7f6483e19ff33f34c3674d0ff4760012000ca32d8a16c76ac9e36725939a2f06485bbdc50d6f7e183ade4341741356380b2515050ae2e76e96ace246df37c4f194e41e9fde28364975d7edca7e5ae3ab72ee5c494f538b52d3053a045b6dd058e25a60788ebc72a1986958f38dcb9dcf86073e7b03c6f56e2fdbc26dc91b63a2151f6f76ce8a7141b427c54f7b393909e36cb032002c57a162867e0d12cde464dae86f2afd6d1fb3d17f1362293457bd7175249eed67712fdc4ad03d54579789072d5231d19e943a7e8a4523abe11d8752561a9e6a225f15986a0ec8c781b839505888f86602aa5fe2f79961ae4ba91703d2a401e8e47e971fcbcb9915b83ee7196222f2b55fe718ec5ee24169c5bbbc1fd266dc7bc0214c2190bb5d9d710c9c168839a51fb2624c7cc813348cb1acfbedd2d8be7b8d6c7653597262bb102ece93c1163cb0acf1bdfa9cb8b2ec15a947d6313ccfb9d9cf607f3fd86096ec6aab0f2ede0fdd9227266d3ada48dc1c00f4c21bce496afed6ae74746f4aefdff301fdbe83b8967a5ca40f5f347bc91ad008f4c1d3e3c54392d697346787afc551ad641e84268be4c0c91b1a4fd586fb8aca73c40267ea09c966859fc30367207e2cb56cc17cad9f4263d39c6d1a3397f71ee27ad5b8f9ac47f32f1ee4a5091a18d77efbf0fab014c3f0aefc13027e5254d70b0c5701ee64798cbee89a89dc1d08303ef56e6be3aa991a4d1ecb0f8e0d867f3c453956a7ea8e636741c0d7c39ac56f5f5f11e78fd9d7c1f2e33f9ac59f48111927fc1e563418c9f4af3434daeea89227e08f2069a702931d554c9eec02d4855859623a4f2239bd8b6233d81700f129ac5a13dbc2f90d93c8cd4ecdd697fe6bb8b35c6826a4fcf109d45f6ee30b22494f7fe0dbb9e816108db7b5e45d4617fe2613c48e9b7ee9f250f2a513b28e0c64ec1261b10bfb8c07ae85fee5e29370c49cc167d479163794ce551faa4357536d24d33d91245dab61cfdd9250cf04f00433f3e7c442a20d713e95093736963a0d3d51f0a3436aeefb1af46d5fdf4323fc442f2ef02708b625762d0926d062b62ec07b36556e0d184b0bd24bc3bd33da7aa663945cd355da76651d5c1f6726978ead8f760af43b240ceeac646cb9e02118c579fd7c0aeeef6f2c00ab071c7ed8996aa11f62200194fbc18e10e37f8406ab64cce27705e73e215fe9ef61562be9eee87a4c1799363b261c6ea49d9dd2bd11fb12378f9ce4452e23842bec3ee33314f3f1597b1a88f179b91c08ec208f07101b283e5c68265f6a6aff1a70f48c14aac03c4f743a8c3be38f09a492285bd5e39629e11b8adb5c0c4687e595d14c3e80f37ad04566a13ca4cea99dfbc7434b1688f31da78ffa0b1fd53f27822fc206eec3b6ac7e3f9e461dd17310d352069f2ecf1135b5e7d541852f827c1d2431f0871ac955bad5e8d2d140c60290215b2d29f2c2e2215e38739deacfd5b2e43b6090e668df42fc16b8ad13d2388fb75e457908824870b73b2f532bd2526e86d2b8a014b574ae91cddf9e6c3f032a597056e4a5c1a30dc69a8d53e35c17ed0088b445a1d338c5229e028b402af87d6fddab263321d1f3012799a367dd46673763411c700cf9c66874a63812631ef08b87f54d3bef0fb0b03352e528ee50e3dbc8212ff0aa49a7036bb97cbfb69d0772c9126d0422779e97744ac746c2e1bc921a84813daa05a415986e24da9554bb2dcfb7f6344fe3f7ea629246792e178107e98c9b9569cfd690a50a99d78b2385c847c12d01874547fc2891970f7686c2625f6b8c4030c241b174ddf00a2e675eb095f68c48829dcfd10c7ca126607146e775c852fd2f53077e099a427b7c20a5b7d5409383ce2c21e40987f7421d0a6e26f16b83cbf8268bdba5374948993231b1a9cefcd043a59bb647f356cb7665d38c109f165fdc17111bdee599252f20d420da035ba836300c1bfc1467a99d4a5fa4066b58b5aa2cc52f2634874fcc49ff48597c07966e8804b558e4d239be6b3b6f64205fee5b5230b2442e147439d1d068e17486fbd2224e8e428c1965ae18f4325bb7fae8503a10d4d39b6635ea5f7f8e502b7f947439a1885bc792a90581939f61e4abe88ecafd80dbdc4c62821a38100ffaa8c4d4c537fcef107598f1fb1712ddf2816a51fc7fd4380c20a1b408af1e384202b6214c4d1c0e802377f0c439abef16e90719c704710db14a4ac45c3889338b50451ad7e3018a297081a3ff4f67bec3034a304c6cc02b27586a53f05c75c5203a9400ae0d611c2b67cbc5b75763a231e9c526fd7a838819341cce07872eba3a92d942fd754a8e7ccf68fbe10510816beac387782c22d3a92839e12d02bee97f73dafd1ae3015e79605aa13acfd100f990bc0a1c19d194f650113ce8c4abc548c621916919ca409712708b26d1581d261659349844ed91cdcd445e2c87d1dd81eb1bb9443b386e7603437c5197e3d06d9c8c8e3ba2162e93d9f5c7f60d1a94ae209af83f7b31d2c1043ab366f600323eea530d7bc9a2b66ccf2c35f86de1244af7a4e1ef94f41e0052e383709bcaa2ba7fadbbc561e68a325ab9ccacf10963e54b38ea10b16604542b786245632216cf21ba14f167890c2301fba528c89729ebc58b8f77489552c336cff11653bbe152616b564160813e0d3696332468ec592e7a6b63f6ce87ff2a3f948e14effcf60c37c22d497c7fe4d1f74c88a099da5014eeb8f0a95d36aacbec45444f53f42a6c4b6c0189f58939a8c2f98cd3ec799ffdc9d461a6d361c5eac2c7770f75d54adca8a338a385f7b0d9bd41916047ac5c78cf4c8a40b34102f8766a8fbed08d3d363795487f73616cf5c5cf8c7b99f05fd7040a1592f0fbfa00cc97600265713bf49c7ced28f1bf5fe7353d0b84ced775b83abd755b0a0b2fcfd27e442a2bc9981f3247def2c4678f85363d4302ffecf5224ef3e65d4ebcad1cdc5f3b5f4b52ee0eceda03e8918d4350b6ad939a56731cbf93f5804cee579981bbf3f6bd3ba589aa5516880f4b81a27264ead8a0348bfde30883b7a45e6e026184265b6cd05703423694336767dc39497404f0c69e228847525299104b06a954539a4cd808579e545e1e045c6a895d03353f35a0c4191464004b1b0eea12b5a17487b1e3368eaa89c2f0d1dc295c7af90790ceff3d2f0fddb5eaa0aeed13747f42b8239671c817463b57c5b66387ea2a325798917cba0db11135af2b80d1dbcd4f670a5c4c9aeaf0940e272f6485f14b12088025ae2bba02152ee606f331577157c163dcddebfe8b126e56ba489bd9fd1330abcbfc094b833bec8b1a2a32de92c9b28edae6cf5992afdd2f89737c508612a356497ae0000ea9c6197e19634e478b6a14899b88b10712a07049efa4c368adf1ec649e5ff0804f36061c036a81f456e85b746ad7457c91c348198ae8a15d1b51d24c76333d4f7b20a4e5ce6c3064c2d74a54e9b4f2a90166430199572aaa50f8c31470314264e0ee964df1bc4d94d22755895ba56b75d0578d7b90281feb37a7ab19d08fbd25f526e6a0642886ba8e96a4befb343b469fe2331d2dd1e56bcccb59bc71c2dc06ff2b0123ec0d52d66f76a7eb85a626581e12bea5b5ba799dc7dc3af6d5ec97b4c4f5b4fa902a70b4128a18f5faf90762a54ed26bfda40b14b3e921ab893964cdd89caf0afb4b934f68a3ee7b59393f8218836bff7b9727a461562d28cb46a75d9dc4701f846d7d1d1e73a6bbbbb5d49d8b96ef0a3d794a848596eee2611041ecc588fc7b551e7496e7f11b172d367e23c82d28ca8492efb83199ea5a6060fa9470772096d638057dbd56b11e9f64420b297e08357211bce7125672a1c80674869f81b2315832d9e69d46b5feb9fadc987b69fde2cf942fb27eaac78a14598973f988fcebe9938aa41192147c71d4d2f3b9288d4d7c9d72fbbf7f5c42e1847b8d9939f27e24d726380618a4621410163b2504876bad4a108816a5166c059a0b27a43921a9b86a5bed2578c07185807659a496d2de570b247844e189552409d6bc4d46fcbf7f72234ecdd67f9273a0809f259d521291e675c6a700346b3667ea50b8c8afecd05765770b6cb27ac2b5373b6cc4f3d5a576b98f259e9855e775b7eacc719ce33c95eba245e973cbce5f9c535a1b4245172e1c88c792bd182079bab90f544753fc6224b86ac073d129baf2a9729f01941326be1721139f2bfea073ecd242fc2299c159475126df0d29790d862710cba2d61c9b86d789ab535eaa7a2cce8185014c5188859ad91f32625ad61a3741a186d48bf0a5f6e4df8aafae234d145d0e5bb9ac0134d309d446f7d32d7df4dc3a8cd64e817630ca2c14945774f72abb517928fadee3af6b2e72127010db7e32b5b1d1d7559395d192900142a56b7f8a363706dec5b20ee99f858a6050769f80632a9164ddf0192793f15450a67fca26c13f1fe4bce43c4eecba115cc00863776d64a64af52c5446638766596afc3121bf84ff152acb193e94924eeed85d399edd9a8748aa9e8c6794fc04322d74ef0a253e90ab7d842bb60e175160fcd33d7a53c3eb2406860e98e83f17d118906ee2bf85029043dd8ac8cf5be1d33efe82c14d3a9be445dede4008411e6b65d20e238b20c14ab28378f3a1d98addcd4359f74b0a933b09ba1f85337f925dee479258d878bfd908adfca7027feff2ba4dcb1d93806c7694148a45aa9c4c6c59ccffa70e93beaf341fbde6c9e60e71efef61289d210d58ac5c8e77f643cc9be409647a1d9f455c7c6726aa4d0365d3365e940dd8b3d478d984326b2c800905eee9b091ff8701b89de409be89a8016b8ccb8352926e89306dd28953bbf1551c836442842025cf02371aa414b7e808dcb30e9204ff178f248d6fada394b89c25ab25a3355e5c0cab9677750cfa079d84d25312421cb724057125845f21447e3cb1b49cec67241b509b12f2c112aaf44e0d845461b764fbbb20697c231db6d099bd0a701fa48acf87878bc7510bd7a1babec0ed5169a24eddd27915360bc2524597dc98a14b486cb8f4747a93565d39850761e793edec9f7df129c19cd3001f62df8c8fc83f2d42c5"]}, 0x1128}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000001340)) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) [ 2041.637612] audit: type=1400 audit(2000000537.249:72770): avc: denied { map } for pid=8834 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:18 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00000000c0)=0x8, 0x4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xa) [ 2041.782914] audit: type=1400 audit(2000000537.279:72771): avc: denied { map } for pid=8835 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2041.888495] audit: type=1400 audit(2000000537.289:72772): avc: denied { map } for pid=8834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2042.032090] audit: type=1400 audit(2000000537.329:72773): avc: denied { map } for pid=8834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:18 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000001a000000032f66696c6530"], 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='sMa\x87s_ro\x0flup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0xfe02) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000200)) sync_file_range(r1, 0x7, 0x5, 0x7) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000100)='net/ip_mr_vif\x00') 03:42:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x8, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:18 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:18 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) 03:42:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x80000) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000000c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:18 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0xc000, 0x3) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f00000000c0)={0xfffffffffffffffe, 0x1a, 0x0, 0x8000}) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:19 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:19 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:19 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000080)=@hopopts={0x1d, 0x1, [], [@jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0x1}]}, 0x18) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e21, @empty}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x2800) 03:42:19 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:19 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) getpgid(0x0) r0 = socket$inet6(0xa, 0xa, 0x7) dup(r0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000002c0)='\x05\xbe?\xd1osz\xb7kG;\x93\x03\xea\xf5$C\xc0\xe2W\xf8\xb2\x95\xe84\x10\xf7\x8f\f\xacG]S\xe1\x0eO5\xe46\x94\xe5\xb9\x86n\xee\'r\x03\xe6\x84\x1b$\x8b\xd0\x8b\x90\x97nU\x98\xac\x8c\xeey\xe7`\x84K\xf5\t\xe1g?\x98\x92D\xe0\xd4\xdc5M\xb6.6H\x93\x98;\x86\x8bk\xb3I\x11\x8d\x13\xf1B\xee\x8d\xb8{\x9f\xa7\xec\x9c\xeb\x9c\xe3\x81 \xa4\x19\xfe\xf0:\x85\x04\xb0\xf2w\xd7\x8f10\xf51\xf0\xf6\xcc\x1c\xba\xf6\x03C\'\xa8:\xb0\x89\xab\xdca\xaf(KI\x97\\\xea\xf6\xf1\xeeb\xad\x8f\xc4\xc260P\xcd\x1ek\xae\xe5(\xa1\xbc\xb1\xeb\x9e\x19\xbc%\x19X\vl\xae\xf0`\x81\xf2;a\xa6r\x18\xb7T\xc48K\x95\xaa\x0e\xba\xe6c;\x01\x8f\xac]\x11d\x0e\xd9?at\xe7\xba\xadu\xee\x8d\x99ZTh\x05\xb6V\xab\x06\xe6T\xa8\x1e\xe8+\xa9W:J\x94\x0f\x9f3w\xc2}\x93\x1az\xeb\x8c\xb9;c\x99ZY\x90\x93n/\x95I\x18kBa\xe1>\xa6\x06\x00\x00\xe2\xe1\xf8\xaa\x93\ns!sePH9\xf5\xb1\xaa\xfc\xc1KM\x92\x9f\xe3\x9e\x14\xb0\x0e*Y\x83\x19\xed\xe4K\xbe\x93\x81\xce\xf3\x97\x90\xa0\x14\xda') ioctl$FS_IOC_GETVERSION(r2, 0x80087601, 0x0) read(r2, 0x0, 0x0) timer_create(0x5, &(0x7f0000000040)={0x0, 0xa, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) timer_delete(r3) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000000)) 03:42:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0xfffffffffffffe0c) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) read(r0, &(0x7f0000000000)=""/189, 0xbd) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000000c0)=0x8, 0x4) 03:42:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5421, &(0x7f00000000c0)=0x48a) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0xfffffffffffffffd, 0xffffffffffff7fff, 0x8, 0x0, 0x0, [{r2, 0x0, 0x3}, {r3, 0x0, 0xffffffffffffffe1}, {r0, 0x0, 0x6}, {r3, 0x0, 0x100}, {r1, 0x0, 0x8001}, {r0, 0x0, 0x6}, {r3, 0x0, 0x1ff}, {r0, 0x0, 0x403}]}) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:20 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:20 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00\xec\xd8\xec\xc8\x00v\x16J\x8e\xad\xb4b\x83\\\xfd~\x01\x12\x04\xb03\x17\xe3>9_$\xfa#\x96\xd8p\x9a\xa1\x8b\xe1*\x03=a\xdf+\xeb3\xc5\xed\xeeFf\xfc3g,\xccD\x89\aRd\xae\xcb\xc4u\x93)\xce\x00'/91) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000000)=0x6) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000080)) 03:42:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f00000000c0)=""/253, &(0x7f00000001c0)=0xfd) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x40000, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffff1100ffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:42:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x20000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$sock_ifreq(r1, 0x897f, &(0x7f0000000040)={'syzkaller0\x00', @ifru_flags=0xc000}) 03:42:20 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:20 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') read(r1, 0x0, 0x0) 03:42:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_UNALIGN(0x6, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:21 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0xfffffffffffffffb) getsockopt$inet_int(r0, 0x0, 0x11, 0x0, &(0x7f0000000040)=0x239) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 03:42:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) r25 = open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0xfff, 0x5, 0x7, 0x0, r23, 0x401, [], r24, r25, 0x43, 0x5c8}, 0x3c) 03:42:21 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:21 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') read(r1, 0x0, 0x0) 03:42:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:21 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:22 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) setpriority(0x1, r1, 0x6) 03:42:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2045.762942] kauditd_printk_skb: 184 callbacks suppressed [ 2045.762951] audit: type=1400 audit(2000000542.159:72957): avc: denied { write } for pid=8970 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:22 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/ip_tables_names\x00') read(r1, 0x0, 0x0) [ 2045.923583] audit: type=1400 audit(2000000542.229:72959): avc: denied { map } for pid=8976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:22 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2046.067380] audit: type=1400 audit(2000000542.249:72960): avc: denied { map } for pid=8976 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c653020657468317472757374656420736d6170735f726f6c6c7570000a62286f41d289aa8ad3f0259546daafb1f50183b27f436f2fa35bd2e32054e6f083b0fc121f56fed22ae2a9ed6d69caa412570000"], 0x25) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20c0, 0x0) read(r0, 0x0, 0x0) 03:42:22 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="cf010009a2020000bc02000005000000c9020000fbffffff000000000000000064a36aba39f675faadb5839bec46347a7e46858be49b68c335c519030202a9eb5078e6ad97c6a348d3687476df96ac342df95a95fb2f74f8ea20e7f0d14236f5f197c680366c3560773ae41ee3d72b3744c22d0354ad769a0414272573c9610eb5bb84d62dfeda00bd0c400acba6189c0436438bcd187562d936a61f87fe922fc99cdc7aa00f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c18fc4d6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bedddcda00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d8b21fe8121ea1f26ee61b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e833e3656dc7f1def21fd5f07cb2da0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009d021b9fab23f7150000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000062da8031b3c403883b84acb4585ccd8b62d1bd310886fa2dcd7eaecd3d0df7bb1d088bf82e445c6188cc05b3"], 0xaa6) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) [ 2046.235081] audit: type=1400 audit(2000000542.269:72961): avc: denied { map } for pid=8976 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x18000, 0x106) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000080)=0x40) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) personality(0x0) [ 2046.403092] audit: type=1400 audit(2000000542.279:72962): avc: denied { map } for pid=8976 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2046.482027] audit: type=1400 audit(2000000542.309:72963): avc: denied { map } for pid=8976 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:23 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x21013, r0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2046.657970] audit: type=1400 audit(2000000542.309:72964): avc: denied { map } for pid=8979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:23 executing program 5: getpgid(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 2046.797675] audit: type=1400 audit(2000000542.319:72965): avc: denied { map } for pid=8980 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000011c0)={{0x0, @multicast2, 0x4e23, 0x1, 'lblc\x00', 0x0, 0x40, 0x33}, {@remote, 0x4e24, 0x2, 0x34281d95, 0x3, 0x6}}, 0x44) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001180)=0x1) read(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000001240)={0x6, 0x8001, 0x101, 0xfffffffeffffffff, 0x17, 0x3, 0x7, 0x9c2, 0x8, 0xffff, 0x9, 0x7cc}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000080)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000180)=""/4096}, &(0x7f0000000100)=0x78) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0xfffffffffffffc97, 0x11, 0x2, {0x40, 0xfffffffffffffffe, 0x8}}, 0x14) [ 2046.911696] audit: type=1400 audit(2000000542.329:72966): avc: denied { map } for pid=8979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x121000, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) shutdown(r1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x8000}, {r0}, {r0, 0x6280}], 0x3, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000000140), 0x8) 03:42:23 executing program 1: r0 = socket$inet(0x2, 0x2, 0x1000060) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002e00)='cgroup.controllers\x00', 0x0, 0x0) bind$unix(r1, &(0x7f0000002e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x48201) ftruncate(r3, 0x80) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000140)=r5) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xbfe00) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x133) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast1, @remote}, &(0x7f0000000040)=0x8) [ 2047.058570] audit: type=1400 audit(2000000542.339:72967): avc: denied { map } for pid=8980 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:23 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x400000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$KDSKBLED(r0, 0x4b65, 0x3f) ioctl$TIOCNXCL(r0, 0x540d) 03:42:23 executing program 5: getpgid(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:42:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) 03:42:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x9, 0x800000000000023, 0x4}) 03:42:24 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) sendto$inet(r0, &(0x7f0000000000)="729a82573abfdc88ce2946161cea3824116a975671965c01911afaebf517893030dcb7a36fb52f1a6eb103b3e7db3c6bd90aa33220928f33c0906de35b38c7ebadee7da50520db8dba1e4221fe5d6ec251590ce2dcf9ce49309a740f01b6a2aed4c45585e1f4c282e7d7970adfa769fc0459d50ff7e2bbf045e1228606b6949b038385e992aa2fbd7bed658b5646d2dfcabca3153656afccaa287f149f06729742c48c912e8ca064a3e6189e386e6cacaec3828fd5c78f1a37a716ab8f1588fdfc", 0xc1, 0xc801, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0xf4, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x88) 03:42:24 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:24 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000180)=0x9) getrusage(0x0, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = dup(r1) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000100)) fcntl$setstatus(r1, 0x4, 0x2800) 03:42:24 executing program 5: getpgid(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:42:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = creat(&(0x7f0000000100)='./file0\x00', 0xaf) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) bind$packet(r1, &(0x7f00000001c0)={0x11, 0x10, r2, 0x1, 0x8ad70000000000, 0x6, @dev={[], 0x22}}, 0x14) syz_emit_ethernet(0x86, &(0x7f0000000040)={@remote, @random="610bdc40717c", [{[{0x9100, 0x1000, 0x4b7, 0x4}], {0x8100, 0x100000000, 0x8}}], {@x25={0x805, {0x3, 0x57db, 0xf, "dd42a52b75db079534dd3bc852924fce9a2c08a9c6d668f19b20ec62eb95dd2241f1e7cbb5ffbff2e65d5068cb99d302b5c0be108087088532c41f0ec6bc3cd66ad7fb0b14aa9d4cd79f0f46c84d9168d281f168d26299136bee311a4c2cfe3c1a530d0b3ae702dcf3e50b0d93"}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800019078ac2314bbac14141104049078000000004500000000000000001b0000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000200000010ac14140000000000"], 0x0) 03:42:24 executing program 2: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) r2 = syz_open_procfs(r0, &(0x7f0000000000)='smaps_rollup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='/dev/zero\x00'}, 0x10) rename(0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, 0x0) madvise(&(0x7f0000b2e000/0x3000)=nil, 0x3000, 0x0) lsetxattr$security_capability(0x0, 0x0, &(0x7f0000000200)=@v2, 0x14, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x401000000801, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8400fffffffe) ioctl$int_in(r4, 0x5421, &(0x7f0000000000)=0x3) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000640)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000740)=0xe8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000780)={'syzkaller0\x00', r6}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x4, 0x10080000000, 0x8, 0x2, 0x800003f, 0x365, 0x3ac, 0xfffffffffffffdce, 0x29, 0xffff, 0x800, 0x20, 0x2, 0x2a9, 0x7, 0x2}, [{0x6474e557, 0x1, 0xffff, 0x3, 0x8000100000000, 0x4fa, 0x4, 0x6}], "801c1e5753a6e35c50229bc82d21824c167488d9533e5556b114afc4a4835331beb838097a", [[], [], [], [], []]}, 0x57d) 03:42:24 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_bond\x00', 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) 03:42:24 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000200)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x800) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="053e6611135051447cbad87ad067", @ANYRES16=r3, @ANYBLOB="04082abd7000fbdbdf25060000000800060008000000080004000002000008000400020000000800040001800000080004000100000008000400d3000000280001000800050004000000080004004e23000014000300ac1414aa00"/102], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x0) fcntl$setflags(r2, 0x2, 0x1) 03:42:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) prctl$PR_SET_TSC(0x1a, 0x2) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e0000002000000000000000000000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = mmap$binder(&(0x7f0000fee000/0x10000)=nil, 0x10000, 0x8, 0x12, 0xffffffffffffff9c, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)={0x267, 0x9, 0x81, 0x9, 0xfffffffffffffff9}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={r2}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r1, 0xc0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x14, 0x10000}, 0x0, 0x0, &(0x7f0000000b40)={0x80000000000, 0xffffffffffffffd5, 0x0, 0x84dc}, &(0x7f0000000b80)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=0x7}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d00)=r5, 0x4) r6 = getgid() getresgid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a40)=@nat={'nat\x00', 0x19, 0x4, 0x528, [0x20000500, 0x0, 0x0, 0x20000530, 0x200007c0], 0x0, &(0x7f0000000100), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x19, 0x74, 0x88a2, 'lo\x00', 'bridge_slave_0\x00', 'gre0\x00', 'veth1_to_bridge\x00', @broadcast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe8, 0x150, 0x188, [@mac={'mac\x00', 0x10, {{@empty, 0x1}}}, @owner={'owner\x00', 0x18, {{r3, r4, r6, r7, 0x3, 0x6}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x2a}, 0xffffffffffffffff}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x20}}}]}, @snat={'snat\x00', 0x10, {{@dev={[], 0x1d}, 0xffffffffffffffff}}}}, {{{0x3, 0x4, 0x8877, 'rose0\x00', 'dummy0\x00', 'yam0\x00', 'hsr0\x00', @local, [0x0, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xa0, 0xa0, 0xd8, [@pkttype={'pkttype\x00', 0x8, {{0x0, 0x1}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@random="8dcf67b430b0", 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0xb, 0x0, 0x201, 'bridge0\x00', 'vlan0\x00', 'ipddp0\x00', 'veth1_to_team\x00', @local, [0xff, 0xff, 0xff, 0x0, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xe8, 0xe8, 0x120, [@time={'time\x00', 0x18, {{0x800, 0x9, 0x8582, 0x3d38, 0xfffffffffffff97c, 0x4, 0x1}}}, @realm={'realm\x00', 0x10, {{0x5, 0x0, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x10}}}}, {{{0x7, 0x2, 0x9300, 'rose0\x00', 'irlan0\x00', 'nr0\x00', 'veth0_to_bond\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @random="cc621b729f25", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @snat={'snat\x00', 0x10, {{@random="cbfd4230bde9", 0xffffffffffffffff}}}}]}]}, 0x5a0) 03:42:25 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = inotify_init1(0x80800) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000000) sendfile(r0, r1, &(0x7f0000000040), 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x0) 03:42:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:25 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) signalfd4(r0, &(0x7f0000000000)={0xff}, 0x8, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x2, 0x10b, 0xffffffffffff0001, 0x1000000000008, 0x400}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x5e, @multicast2, 0x4e23, 0x1, 'ovf\x00', 0x1, 0x5, 0x2f}, 0x2c) 03:42:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000790fec7a1e838cd40ddeb4d7f0b89b0bcaef6dd4bee3db269c153743683c8a7efd16699e6f7c9496ec40279413084025f55a34ab5d5869fda18f41d295af27147721289e6bb07f3eb0c724af452b4700a2cbbc459b"], 0x0) 03:42:26 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:26 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) execveat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f00000000c0)='-selfppp1cgroup[\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='vboxnet1!vmnet0\x00', &(0x7f0000000180)='}nodev.ppp1)\x00', &(0x7f00000001c0)=')self\x00', &(0x7f0000000200)='/dev/ptmx\x00', &(0x7f0000000240)='/dev/ptmx\x00', &(0x7f0000000280)='vmnet0\x00'], 0x1000) fcntl$setstatus(r0, 0x4, 0x2800) fadvise64(r0, 0x0, 0x0, 0x7) 03:42:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x368a860, 0x7, 0x2, 0x7bfa34f3}, {0x7f3, 0x4, 0x796262b5, 0x217}, {0xff, 0x9c, 0x9, 0x9}, {0x3, 0x4, 0x1, 0xffffffffffffff81}, {0x10000, 0x42d9790, 0xffffffff, 0x4c}]}, 0x10) read(r0, 0x0, 0x0) 03:42:26 executing program 1: r0 = socket$inet(0x2, 0x803, 0x5c) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:26 executing program 0: r0 = socket$inet(0x2, 0x5, 0x8000) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @broadcast}, &(0x7f0000000080)=0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:26 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:27 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:27 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x2800) 03:42:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = accept(r1, 0x0, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r3, r2) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffff6bf9b393d1beff0800450000700000000000019078ac2314bbac1414110404907800000000450000190000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14"], 0x0) 03:42:27 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) [ 2050.784101] kauditd_printk_skb: 175 callbacks suppressed [ 2050.784111] audit: type=1400 audit(2000000547.199:73143): avc: denied { map } for pid=9114 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) read(r0, 0x0, 0x0) 03:42:27 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2051.010555] audit: type=1400 audit(2000000547.239:73144): avc: denied { map } for pid=9108 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.153618] audit: type=1400 audit(2000000547.239:73145): avc: denied { map } for pid=9114 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:27 executing program 5: r0 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) [ 2051.311679] audit: type=1400 audit(2000000547.239:73146): avc: denied { map } for pid=9108 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") signalfd(r0, &(0x7f0000000180)={0x3}, 0x8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x26, &(0x7f0000000100), &(0x7f0000000140)=0x4) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x5ca, 0xffffffffffff8000}]}, 0xc, 0x1) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x460800, 0x0) dup3(r1, r1, 0x80000) openat$cgroup_ro(r1, &(0x7f0000000200)='mem\x85ry.current\x00', 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2051.487274] audit: type=1400 audit(2000000547.269:73147): avc: denied { map } for pid=9114 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) [ 2051.626734] audit: type=1400 audit(2000000547.269:73148): avc: denied { map } for pid=9108 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:28 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x194d, {{0xa, 0x4e22, 0xfffffffffffff6f2, @empty, 0x80000001}}}, 0x88) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:28 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2051.833592] audit: type=1400 audit(2000000547.279:73149): avc: denied { map } for pid=9108 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2051.958474] audit: type=1400 audit(2000000547.299:73150): avc: denied { map } for pid=9114 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 2052.102941] audit: type=1400 audit(2000000547.309:73151): avc: denied { map } for pid=9114 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xfffffffffffffffc}, 0x28, 0x3) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000280)="04d3038916d39fbef00cf16a53c4b553f5034f5137b3cf2bb9bcf2c7b97b87d014c76e9b16ededf45bcef854036050c1014e7bc25ccf144c1ac905e31b40fc816f24b1e31b6b4b60860eb03e38ff1327fb63a5356e028346a1bc28f5062807172ed2ae22893b2a0dc9dd610e4e59fca1a9ddb62073efeeca22c6abb8a8a2cef3e7addc2d56d30f9d5f3cfa5d3603b0280b0012da8bf9574fa439dcb9d5c53ee4f121699c8b666784639a5c427e36a50cb8fbb31aa74d4af07648b681c1506f4df8eae22c68ef57064e93417a") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000440)={r1, 0x0, 0x7fffffff, 0x5, 0x5}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000180)={r2, @multicast1, @loopback}, 0xc) fsetxattr$security_evm(r1, &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@v2={0x7, 0x0, 0x4, 0x9, 0x6c, "2d81264ff2e2ab16f4f50bb683989eb02ac35b7cb14bac4f78854e3b066373e2fac6e82173ec190c8897b6e1c868847b19276f6563dead78e832f312d995fa2e84bd79bc9be497ee298a77e79d0c38ba07854d3179efce9f79c4e0dada5ebdba0756da78f0a8bfc5b0801a8b"}, 0x76, 0x0) 03:42:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xffffffffffffff99, &(0x7f0000000000)={@broadcast, @dev={[], 0x26}, [{[], {0x8100, 0x2, 0x40, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2052.279913] audit: type=1400 audit(2000000547.319:73152): avc: denied { map } for pid=9108 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:28 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:29 executing program 1: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x3, 'ip6erspan0\x00', 0x3}, 0x18) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r4, &(0x7f0000000200), 0x8000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:42:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f00000000c0)="42fdebd7834a56fad9cbbf93274ef60586dde0f44c49132d19b3e922ed00e52978c110db3b81f666df13df258150785a3d8fcad1b400f89d357dd1e4dd3a1bcb168e4353c1a52280f0497ea46f587b3ac68a5deb23114257c5934f4f54568e2f55a08d907bd6f61d87355f8dc717df62a6521e741b7ef302c31c6ed4972759f5061dad8b9f1574", 0x87, 0x4, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:29 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) 03:42:29 executing program 1: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2000, 0x91) r2 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r0, r3) r4 = socket$inet(0x2, 0x1, 0x5e) getsockopt$inet_int(r4, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:42:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000000c0)={0x401}) openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) 03:42:29 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001440)='/dev/null\x00', 0x101000, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000001480)={0x777ecba8, {{0xa, 0x4e23, 0x36be45cc, @mcast1, 0x8}}}, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e00042222eafc95f1e9c4d5753000100"], 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={0x2}, 0x0, 0x8) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') r2 = request_key(&(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='system.posix_acl_access\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000016c0)={@empty, @rand_addr, 0x0}, &(0x7f0000001700)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001740)={r3, @remote, @rand_addr=0x3}, 0xc) keyctl$set_timeout(0xf, r2, 0x5) r4 = creat(&(0x7f0000000200)='./file0\x00', 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000012c0)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f00000013c0)=0xe8) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001580)=@req={0x28, &(0x7f0000001540)={'ip6erspan0\x00', @ifru_flags}}) sendto$packet(r4, &(0x7f00000002c0)="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", 0x1000, 0x20000000, &(0x7f0000001400)={0x11, 0xf6, r5, 0x1, 0x0, 0x6, @local}, 0x14) socket$inet6(0xa, 0x6, 0x3) 03:42:30 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:30 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet(0x2, 0x100200000000003, 0x60) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000400)=0x10000) r4 = dup3(r0, r0, 0x80000) ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) setresuid(r1, r2, r5) 03:42:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) read(r0, 0x0, 0xff06) 03:42:30 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000080)=""/2) 03:42:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x4e23, @rand_addr=0x6}}) setsockopt$inet_int(r0, 0x0, 0x3b, &(0x7f0000000080)=0x3, 0x4) r1 = getpgid(0xffffffffffffffff) sched_getparam(r1, &(0x7f0000000000)) r2 = syz_open_procfs(r1, &(0x7f0000000240)='net/mcfilter6\x00') ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000280)) ioprio_get$pid(0x2, r1) syz_emit_ethernet(0x7e, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f0000010000000004a742feffffffff00000000e000000100000000ee141400449ead7088be122ba8dc"], 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000002c0)={@dev, @initdev}, &(0x7f0000000300)=0xc) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x3, 0x1ff, 0x9, 0x1, 0x0, 0x7, 0x43024, 0x6, 0x9, 0x8, 0x1, 0x1d9e, 0x8, 0x3, 0xffffffff, 0x5, 0x9, 0x80000001, 0xffff, 0x9f2, 0xfcc1, 0x5, 0x0, 0x7f, 0xa2ef, 0xdd, 0x7f, 0x190e, 0x3, 0x4, 0x1, 0x7f, 0x8, 0x6000, 0x99, 0xffff, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000180), 0xa}, 0x928, 0xffffffffffff8000, 0xd93f, 0x9cbc3d3cca1451, 0xa954, 0xffff, 0x5}, r1, 0x1, 0xffffffffffffffff, 0x1) 03:42:30 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:31 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) recvfrom$inet(r0, &(0x7f0000000000)=""/31, 0x1f, 0x40000000, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ftruncate(r0, 0xe5) 03:42:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) r25 = open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0xfff, 0x5, 0x7, 0x0, r23, 0x401, [], r24, r25, 0x43, 0x5c8}, 0x3c) 03:42:31 executing program 2: mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000180)=0x13e3698534b67ca2, 0x80800) pread64(r1, &(0x7f0000000080)=""/109, 0x6d, 0x0) 03:42:31 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) write$P9_RMKDIR(r2, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x1, 0x2, 0x7}}, 0x14) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:31 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x82d97) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) r3 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0xffffffd8) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000300)) pwritev(r3, &(0x7f0000000280)=[{&(0x7f0000000100)="7e1995b62210d86e2e45f57527eb58a0b3b3", 0x12}, {&(0x7f0000000180)="4fcc015542be8cd5a60085929a7e005872fc5dd461773bb560684377d2e86681bdd1694d27a521dc6c6bc0ac2f67de6b303394b2c807c0f052cb847b76cc802c767048a92237fb306e5151", 0x4b}, {&(0x7f0000000200)="93f271de07df5753d0089107e1c48d3ea5b4fa03c9671b0337ceb30d322f4a84a3f74bf6fe78e76ebaf578424cf4e49cf6a3b160926629ed7fb2f77986b4b57d0f11b6c73d75ba7802dd08fb6ecd97abe15473c4bde04ef0b2cb8c9d0c01dd", 0x5f}], 0x3, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) 03:42:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) r25 = open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0xfff, 0x5, 0x7, 0x0, r23, 0x401, [], r24, r25, 0x43, 0x5c8}, 0x3c) 03:42:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000040)) 03:42:32 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2055.800934] kauditd_printk_skb: 198 callbacks suppressed [ 2055.800944] audit: type=1400 audit(2000000552.219:73351): avc: denied { map } for pid=9256 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000100)="0a5618a4c9df170aa80f7cb2816965be367ec2e1508524a330e7287ba0a9f156efd640fd8c650c3e07a5faa9b8ad4a3e47aff4e360e2dc0372c9d2c90e8ac82666486839749dfbe131d4559eb1199662d7d548f25014fe08b1aaa694e5cbc702eb6c9dbc69c0220578f31ebb7543186ef7b049cb02ddc3028c1582cf682e99861eab0c96bb989682a95653517e") fdatasync(r0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000005c0)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x2) fcntl$setstatus(r0, 0x4, 0x2800) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/140, 0x8c) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000440)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x20000, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode', 0x3d, 0xffff}}, {@mode={'mode', 0x3d, 0x7}}], [{@fowner_gt={'fowner>', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '@GPL'}}, {@subj_user={'subj_user', 0x3d, '/dev/ptmx\x00'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/ptmx\x00'}}, {@euid_eq={'euid', 0x3d, r3}}]}) [ 2055.942812] audit: type=1400 audit(2000000552.219:73352): avc: denied { map } for pid=9250 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.071988] audit: type=1400 audit(2000000552.249:73353): avc: denied { map } for pid=9248 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:32 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2056.233694] audit: type=1400 audit(2000000552.269:73354): avc: denied { map } for pid=9248 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:wireless_device_t:s0\x00', 0x27) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000280)=0x5, 0x4) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) setresuid(r1, r2, r3) 03:42:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) r25 = open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0xfff, 0x5, 0x7, 0x0, r23, 0x401, [], r24, r25, 0x43, 0x5c8}, 0x3c) 03:42:32 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2056.418273] audit: type=1400 audit(2000000552.269:73355): avc: denied { map } for pid=9250 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.543016] audit: type=1400 audit(2000000552.269:73356): avc: denied { map } for pid=9254 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) recvfrom$unix(r2, &(0x7f0000000080)=""/29, 0x1d, 0x40000000, 0x0, 0x0) [ 2056.753352] audit: type=1400 audit(2000000552.279:73357): avc: denied { map } for pid=9250 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2056.870496] audit: type=1400 audit(2000000552.279:73358): avc: denied { map } for pid=9254 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:33 executing program 2: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x401, 0x800) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80000000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}}}, &(0x7f0000001e40)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002280)) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) read(0xffffffffffffffff, 0x0, 0xffffffcc) [ 2057.034050] audit: type=1400 audit(2000000552.289:73359): avc: denied { map } for pid=9256 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:33 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2057.160105] audit: type=1400 audit(2000000552.289:73360): avc: denied { map } for pid=9256 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x92) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) 03:42:33 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @dev}, &(0x7f0000000040)=0x8) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCCONS(r0, 0x541d) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) ioctl$EVIOCSMASK(r23, 0x40104593, &(0x7f0000000340)={0x1f, 0x64, &(0x7f00000002c0)="041096e55871b5d68e82f8276381a7ce5f50f77ebeb77797945ca2f5319ffb6548d27214806dc30b2600931c7c482162305788b2a3a207c131b007e79387ceed88bfd437c062aebb2c00087f3c7f50b92993c4537d2fab0802df0a6eb985b8a96d203458"}) 03:42:34 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) dup2(r0, r1) time(&(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000001010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000de2d140000000000"], 0x0) 03:42:34 executing program 1: r0 = socket$inet(0x2, 0x806, 0x20000003) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000011c0)={0x1ff, 0xffffffff, 0xe34, 0x0, 0x7f, 0xff, 0x7fffffff, 0x9, 0x81, 0x8000, 0x82f, 0x9, 0x92d, 0x100000000, &(0x7f00000001c0)=""/4096, 0x1, 0x1f, 0x6}) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000001480)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e23, @local}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x64, {0x2, 0x4e20, @rand_addr=0x101}, 'veth0_to_team\x00'}) prctl$PR_CAPBSET_READ(0x17, 0x1a) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000140)) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000013c0)={'broute\x00', 0x0, 0x4, 0xfb, [], 0x7, &(0x7f0000001240)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000012c0)=""/251}, &(0x7f0000001440)=0x78) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 03:42:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20010000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x800, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1, 0x0, @udp='udp:syz0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x4048854}, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r2 = dup(0xffffffffffffff9c) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 03:42:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x0, @empty, 0x4390}}}, 0x88) 03:42:34 executing program 3: socketpair(0x2, 0x800, 0xffffffff, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x41000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x24, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x824}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000040)="79b296ef681c1edd1480ede3947cf6989ea25a46e2590397bbc9ce982f15172c81ed3debe661e75524e802b514536a92cdb44e93c06780369631c72cb17012e27a5c04e6cd9632a743cc4ad0eacdd241dfcc37e3272501e0a823fc0b8ee2ab29789bdc561853ba8225288f38ccec283201675480bb008141dfdc548bd76857ac49fc21638f8a4f7a0821975f9ef551cdb43f96f8426fcaa76a94a65cc06426a121fea1264d4736b3515077c3972feb66c4524506b6983190fab7ea7a238ce60887483788e0e3d365299d58d8485c670c5f7145ccd06f6f2055794aeb823a155c265f13fed7d5299dfdbb45ff68bf43e1f0", 0xf1}, {&(0x7f0000000140)="0149187ce0ba3f794d8574d779d11c8db332393e25ff9e8309026409535187dfe2b8301ce6c62b94787a47bd9b8a0ff803621a269c33bced53a5592f9b799d86b7e83eab58b1fd85847d820318eb5f5b297cff16b83f881a7d3001ba533e20c4af44c8fcd63f582955548fa65da5292dfcbb18019d85f0a89545c537c1d15b1a50302a72f32c3d50943f03b5d799c965e9a693686db6c24f9e9668e167b009068e5940dddd3f84cec7b266c75c13134306d717802fc6", 0xb6}, {&(0x7f0000000200)="ecec53e1be65f2148a901c995f89dafb7bc3fbc586eb063fb439a655de", 0x1d}, {&(0x7f0000000240)="6361b7f0d6020056ae382a64d1529f0f02641ea39897922f2b84d51fd307efcd063199c66df8a90486e1a9350388074ad423dc1336f05b65de3821789421b3072b59e6dd230d368100512f8782957980b0a39fd15d41a7c9dd6b7980a8cec500e34bb7fb586457bc9421cec6a2f2c3", 0x6f}, {&(0x7f00000002c0)="61b05d9786bd57c58621ff35746f93d0edd73d651ef76cc0cde0e6aad966f0217b6cea2e88e1cd21dd7cc422eda64bed2e49b7eb0b860052d3ca6c1d1fbeac724724febd427b38864f5af5e252a4ffd1d069252c8acd69", 0x57}, {&(0x7f0000000340)="34e373c0b179e23e6c97d79cc10184aa270f6f9b9af4459393f63b6808b8c0a32bd1b3a4c81564efbd157d45ce0cb544299756c724aec5631a07a707c1f61883aa6ad33ec70fabb3123a928ba628404cfc31f19460cf185e3a90da02f9d3ee69c62fc854f4a75397689445f03a3933faacc72037353ae82e593ca6f4966e33d9630e443fee34e12f15acee1a55667accdf5bddd5e7bd0311172a", 0x9a}], 0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r2, 0x4, 0x2800) 03:42:34 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000480)={0x7, 0x1, 0x6, 0x8, 0x70, 0x6, 0x2, 0x100000000, 0x4, 0x7, 0x0, 0xfed7, 0x80, 0x5, &(0x7f0000000400)=""/115, 0x0, 0x8, 0x5}) 03:42:35 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) prctl$PR_GET_TIMERSLACK(0x1e) 03:42:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000040)={'veth0_to_hsr\x00', @ifru_names='hsr0\x00'}) 03:42:35 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x76, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:35 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x109000, 0x0) fsetxattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7365637550a52ece2e00"], &(0x7f0000000080)='&self\x00', 0x5, 0x2) socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) read(0xffffffffffffffff, 0x0, 0x14) 03:42:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x86, &(0x7f0000000040)={@remote, @broadcast, [{[{0x9100, 0xd93c, 0x4}], {0x8100, 0x1000, 0x80}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) open(&(0x7f0000000280)='./file0\x00', 0x3, 0x10000000004181) 03:42:35 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="9f0000007d010000000400b8ffffff0104000000000000000090840df7ffff0900000000020000000000000900656d3163707573657416007b6e6f64657626006367726f7570766d6e6574317070703173797374656d656d3176626f786e6574305c656d300013002d736563757269747965746831776c616e31280f006574683176626f786e6574305b2b2f0000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x9f) r5 = socket$inet_udplite(0x2, 0x2, 0x88) tee(r0, r1, 0x7f, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$P9_RREAD(r1, &(0x7f0000000440)={0x89, 0x75, 0x2, {0x7e, "407c7aa294aaa937a1ae1973b550c647e50ed6d99bf6024ef199f42d4eda2599bd4dbd00436b472607aca620055b0f3b66db646ea87ce4df3ee112eb068a7061ab377e9658430e4a217f45d469f78b81d0a2767d6da91bc9fa5e93aec5377cad2dda5521f865851b2cfe3dc56c1f6946588a44fc2428c1c55dd1549d5858"}}, 0x89) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) dup2(r5, r6) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:36 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast2, 0x52, r1}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x0, 0x2, 0x4}, 0x3}}, 0x18) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffba827effffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000003c50033c80000000007f00000100000000ffffffff00000000de0000019bec51056ba02fb0456bcc3de43300"/129], 0x0) 03:42:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) 03:42:36 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = socket$inet(0x2, 0x100000000000003, 0x60) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) getsockopt$inet_int(r2, 0x0, 0x5b, 0x0, &(0x7f0000000100)) socket$inet6(0xa, 0x6, 0x80000000) 03:42:36 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:36 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0xfffffffffffffff9, 0x1, 0x7f, 0x5, 0x0, 0x6, 0x1, 0x1, 0x4, 0x2, 0xa50, 0x8001, 0xde, 0x87f, 0x2, 0xffff, 0x10001, 0x9, 0x8, 0x9, 0x100000001, 0x4, 0x40, 0x2, 0x1, 0x0, 0x100, 0x7, 0x1fc000000000000, 0x2da6, 0x2, 0x2, 0x80, 0x7, 0xfff, 0x5, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000080), 0x2}, 0x80, 0x6, 0x1ff, 0x2, 0xfff, 0x7f, 0x3}, 0xffffffffffffff9c, 0x2, 0xffffffffffffffff, 0x1) ioctl$void(r0, 0x5450) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$P9_RSYMLINK(r3, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x20, 0x1, 0x7}}, 0x14) fcntl$setstatus(r1, 0x4, 0x22808) 03:42:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) socket$nl_generic(0x10, 0x3, 0x10) read(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'netdevsim0\x00', 0x2}) 03:42:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="fdffcddaffffffffffffffff085405d7b3700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac1414d10a4000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:42:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) r23 = dup(r0) ioctl$KDGKBTYPE(r23, 0x4b33, &(0x7f0000000200)) [ 2060.812294] kauditd_printk_skb: 269 callbacks suppressed [ 2060.812303] audit: type=1400 audit(2000000557.229:73601): avc: denied { map } for pid=9396 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:37 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x10000000008, 0x0, &(0x7f0000000000)) 03:42:37 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2061.048341] audit: type=1400 audit(2000000557.229:73600): avc: denied { map } for pid=9395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.230584] audit: type=1400 audit(2000000557.229:73602): avc: denied { map } for pid=9395 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:37 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000200)='attr/prev\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') read(r1, &(0x7f00000002c0)=""/75, 0x4b) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="68800100", @ANYRES16=r2, @ANYBLOB="04002dbd7000fedbdf25100000004c00030008000400ad010000080008000300000008000400ff010000140002006272696467655f736c6176655f3100001400020076657468305f746f5f687372000000000800030003000000080006007f000000"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) read(r1, 0x0, 0x3bf) fcntl$setpipe(r1, 0x407, 0xa) socket$unix(0x1, 0x1, 0x0) [ 2061.434326] audit: type=1400 audit(2000000557.239:73603): avc: denied { map } for pid=9396 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.575935] audit: type=1400 audit(2000000557.259:73604): avc: denied { map } for pid=9396 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) dup(r0) 03:42:38 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x14, 0x0, &(0x7f0000000100)) [ 2061.752364] audit: type=1400 audit(2000000557.269:73605): avc: denied { map } for pid=9396 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2061.821255] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x0, @empty, 0x4390}}}, 0x88) 03:42:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000040)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x46, "5a59f0911d5032f4bf4cbd1aba40c3b05bce06446c45fd3df5c403fd01754c3f0a076ea5b6afb798c9bc4527d562fbeb984330c0c1ab66e69ce374f5248042004e6a9bb6073d"}, &(0x7f0000000000)=0x6a) [ 2061.876233] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2061.883317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2061.889142] audit: audit_lost=1992 audit_rate_limit=0 audit_backlog_limit=64 03:42:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000080)=0xfff) fcntl$setstatus(r0, 0x4, 0x2809) ioctl$TCSBRK(r0, 0x5409, 0x10001) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000400)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$P9_RGETATTR(r2, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x202, {0x40, 0x2, 0x3}, 0x40, r3, r4, 0x40, 0x8, 0x100, 0x8, 0x2, 0x8, 0x9, 0x7, 0x493, 0x8000, 0x10000, 0x75a, 0x4, 0x7, 0x4}}, 0xa0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000340)=""/111, &(0x7f00000003c0)=0x6f) fcntl$setstatus(r0, 0x4, 0x2000) 03:42:38 executing program 2: r0 = gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='mountinfo\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000000)=r1) getpgid(r0) 03:42:38 executing program 1: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2, 0x0}, &(0x7f0000000700)=0xc) r9 = accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev, 0x0}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) getpeername$packet(r9, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000002080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002040)={&(0x7f0000001700)={0x924, r4, 0x0, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x1ec, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5f53}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x24c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffff9, 0x3, 0x40}, {0x9f44, 0x4, 0xffffffffffffffff, 0x5}, {0x21cc5e47, 0x80000000, 0x200, 0x5}, {0xffffffffffffff2c, 0xffffffff, 0x2fc61b24, 0x7}, {0xffffffffffffff80, 0x8, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r20}, {0x1a8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x924}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) 03:42:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x9c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x34b2}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r3 = open(&(0x7f0000000440)='./file0\x00', 0x80000, 0x8) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000480)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @local}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x7ff, 0x71a, 0x7}) io_setup(0x2, &(0x7f00000000c0)=0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000300)="74c612d30be290e9d088dd8cf188d6272b61753a7f16884054d0daffb5964362dca2ea3740f2c5d55dd9f425a265226764b7b9eb00c96d51d16c8b09c6302ecdd84e0fd3b4e99b174eb1c52d4bb71d32af2deb99edff91d846251671475c51448aa99e96fa1bd564244d1135a73d2875c80e1fb7ce35d3195b53297c76df220df0c3252679548c0d382b3bcc96aa3d3522a434dfb786d4a151e5bbbabe33e9684892dd9a0b80de0b11f5dc703fd4821590595fc22a6c83f4f9d4e3507a6c380161", 0xc1, 0x44001, &(0x7f0000000400)={0x2, 0x4e20, @multicast1}, 0x10) io_cancel(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f0000000100)="cd7b43b43a99bed866d0bcd4d6fc08c04f72fc2a1c37f65d0d410260d8110e719617f9c05187c650f35539193cf0b1bf0129291c40edd09ea93a1938b58d1ec074ae0765dc5cfaa9810cc1274a2380738d1c5c52650a67c4f7449fc4c929036000c899a7405fca9f538d171ffd6b5d42e174925b10535669c837a1522e0b0b47dcfa9449a10bd0b69aca7cdebf4d8fa2739b306060f67c7634b94ce5cce01be7d5269986", 0xa4, 0x1, 0x0, 0x1, r5}, &(0x7f00000002c0)) 03:42:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x0, @empty, 0x4390}}}, 0x88) 03:42:39 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='smaps_rollup\x00') wait4(r0, &(0x7f0000000140), 0x1000000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x6, &(0x7f0000000100)="2b58dbf878527c2f2746") statx(r2, &(0x7f0000000040)='./file0\x00', 0x6000, 0x7ff, &(0x7f0000000180)) 03:42:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = inotify_init1(0x800) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc09003c123f319bab430792accf445268fd00000000000000") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:39 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)=0x73) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001580)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000016c0)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001980)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002d80)={0x0}, &(0x7f0000002dc0)=0xc) r7 = geteuid() r8 = getgid() sendmsg$netlink(r1, &(0x7f0000002e40)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000000}, 0xc, &(0x7f0000002d40)=[{&(0x7f0000000280)={0x11b4, 0x23, 0x108, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x8a, @uid=r2}, @typed={0x8, 0x2d, @u32=0xffff}, @typed={0xdc, 0x82, @binary="e03bd26ef07d6d89dd70f42dc53b1ee680117dbd73a9d978e6dc9e6952b3dfc015784acc0d34d634a9a58ce3b2d455ec19516cad100b2250e393771c6c8f9c042d82023a3d89963c5f5603a944965af14b22c2da0d45f6d24713e747e1ee5245539b6e579dce0ef98a4a0859301653ebe3eb16112ceddf08bf57b09322378785cba8020cf3b66d443d6da16cf55b9ffd75a9c914314bba59a89ddc7d6e8c63e4dff961f712b84bf17d101548a5afca31852724c94b9ba41e30fa0a1dc410dc00fdec056342a936412e222f0c55b6efb3d54bb3c93179c4"}, @generic="bdae9173d05734fad8e94061186476e49b76a5a0eff1b00588bcf6b4088b1b0a576568664d3ada19b65813944e0c59f93aab0756aaf569c6c303809e1c1d6bcba6fa9d199859526f42f166616c29c2d53f4365b29171ce35532a555fa8a63c51b2c145169d731b18d12d9ab5b8ed4aed275c45d7cf517904de980adda27c0c13c461a6cd9d31ca146c8c478c0923543249acd6c72407a501b2", @typed={0x8, 0x54, @fd=r0}, @typed={0x8, 0x73, @ipv4=@loopback}, @generic, @nested={0x100c, 0x44, [@typed={0x8, 0x8f, @ipv4=@multicast2}, @generic="454d99c3ff3fc5483f116936cffe0197b9ccb36b8c148a60559095193d5cd024722b8c6b1ca553e5860a63b79a712e6118537b5cde2c92918125451d6d9ebeb5d7be26efffbf620eed17abc2b2dccc305b0d4bed62a38f89152a154784692eee1d764db23eac46ac1d889ad9490df447863c56d4991b165ef5e421406e7a497df337cc0436c4393af7d4a6fb6c00a459f5da2093e9a451717049be145f50346ffcbe746268f5199b6cba835478d003eaa1df5d4aaeb5d58a820ea03c1baeaf8c4c72ce15786680ec0041899cc4b41e4348d1df362105f000f29c9c60b5873a80efcdc047a613e3106f68668dc2fa9d855892b8bd800bdb8c01576229a160f6a0e15d17ad30f21d96d7910b360b28ecb0291f5adfbad186d92f87f3578815529c0510698279859fd569aec1ac6c283fbb3b84577a4b2464ab961a2c9b3e1f3dd664244632c9236a0033ee1ba1bc6a14687fecef72aa5968ffea6b86372596bbc691522004395320a09e5dd0c512b5ee5512e7c1e9575cdd41b63a4daab6490ae04cea7fff0bda4a388d0139d730214f9431bd6845c94a52d2f8a5661acbc4349e31df1a82ab4d1a350de7ee5e04510039f7b9b4296bf41024f2d122eaa2b2ab1ca0faf2f298ba0fcec42e15f6e6101875504ff36d3295d24b93fbdea2351e068d85393740a24ac7c54035014ef127566fd319221ff04d4f34c231ae7d2b3615b656862d6e766e56c9b45d9c39f8f3d9fb7e7a68f550acfe305a3838d8d43df2001cb667e7e9de26b922dc5dbb7c90bb534f19e048bbe4692489221bce30a0142464ede2137243ae9fa1311f89635cff5fb088befcf008f653c6d39f51424ad15ab518afefb16fa1a71153a15636262e749345beac18c4b4753133760d21e2d961819f53de8faa42634b19f2e71ce5ab2333c8465e2c9e6ccb5ed31fa776eed7265357ac67052b5840eaa36718f698f490ac7ccd7c253bd72f60232e73c7333f1eb0456bf2d5b2a02eac8cab6bf796fa3159f7cf8c0daf1804b3e66e83702f8d0cad1c5329316bd0ca2039f64ba2d977fb68a6cd21e4f3bb370efe4a619f2696532e487c8b1509e8bcef4686274d2e21b795b4d1dc234bf8d9d75499b8e7a87f266d4c8fe05cd099ff71e3d4fc8cf2803bd2fbec88ecd9de1855be3c1343b611ab210f61865b9ef5d98df0b0dec8cd256db71daa631e4ed0b0f7035ac1ea5afde0bdc835eeee0d9fcde5d20aab7a2efbfa7910f76ac13848d02f05ab2a6b89c33485fcc73832b7991d23f2dfe336609e15e5d81a9e02f456d97d78b4300759bc0f4879fb0f81979e9fb97975dc128b57561343ca56c16d2b43ab71db8dafb25f85e2cc8006d046dc758d30e84028b6885205722ec24fb3f35769fa3762b50277471bd8f7da6757e8a606ecbe9ea5c0c4bfc915621c74833ec86f8653c20fd778a8da8228786ffe28c91ffd5c4eb29f5f8d0ce271e87f262eda8d123028daf94bc2b188a669963319bd07ed4b80c8001dd07561b9c2752e1c2cfa50850a1a92800674093c8ed2b49e1e4e560d2d3a9925e5c5432f51d3abd3b80a3b6ddb14de847cf4e58b20d17517840e943d53b4c4557c5a25bd869bec3ef9061daadee96c2e18b0e0f7e148e7f16aac8cc027ba27dd124d6544821d9bdb233f3fc110844b850202c8ec8ce2b194f70a9d01188d06b96d970676eb1877eb657359cab726e3e50c6fc2327bc562153d974dc712b4de27f2cba07999ca84bb0da9033e0923021709f15950be6d91163e715be153476125aa0f61362378d323467a2594358d7ce71817767d6748ccc3296bd79f4a5a03672425a8ff4eb4462e88ec4e702482f2bd10d378d5479a2054db67397e28bfd42aa4b98014b419af37cca37671bbb0560ccaecc98aeb2e45f83c66f09b28e4928ee8ac412a20818debad1c98b8ac54d0ed532d42ce445bbc67c2ff9062bb0936951930c5c1af6cca4feed9a84c24fb34eac3c9ea05195634ebb0dcda1a37d169a800139c69e4ba26004629e89f03ddccd2fe21afeca02112746814ef1d8addaab83d20ac2c0bdbb2628bfb645eec738ae77735cdf564f9b745d0377d0444e522de5f1d662df4b40e3244424277339b7712acef92d9ac5064a2df0088e7756ac117fde20cf753b2c36a94b6268ce9ad03706d240a71b7bb1773ddbfef01a6c0e4d3fa5be1cd3fd573106f9a47644ffcb98849f1a6aed09491bbbbb9d48e99da0a44c382013a24fa8e77bdd59e9b332a361b467cb05b7c0c01563eb96215167c7515d6e04fe5fe6e6d0e68c3b9b2aaff5c3a696bd5ba991faa570bab79e76a4cb45ef9369f2a4e6a8996f4d530b93cb454f847a1d72f58e2858756dc242815251804602483ad7b487261e60162e535c951701c0a502b3b9858454e9d3716da9d03b297425101c04bf5cb7fa481cb32686226ad23abcdfd80f237701f38b713b0c907429cf353905138b04bede25cedb1143a8f40154775dba578dfd1036a325a788a5f123315f6472b88e11ec2996bc0f0c319c6ce98d90547bb7531b83e19f0677108749af6892fa67ce6368aa7288aa6f142bc8e5d93a1eab0a7bc6259182d23ac53ea6b3f7954509e64bff8deb29bf214361cd3c0a8b610cde819b7f2e39550e02ba8b2d4d44f2f47d1634e97a393638d2d4c5eb62ecb32967a3f62040dae668160116a236fe04e3343591b9e695c0ac431720ce6c56ebf64fe2e53587811dff9b1c7b68c48081a522bcd4ddfd96c31e3f129af6edbc141afc7d69c8ac9c758391c5e3570acc9840662e755e46aab8a57dfd911955c7cb3b8ca0f063dd468fe7b5772e55b39c8cfe110186c5db3479a8dd02da20daac53ce88d2608192d5759154e2ba9f9029cdceca2c8710648fe2d77ac0fffd43608bc949cd13c4c7715792ee4c6f2da748c67d2b7da90a4b2a4d7dfa6d66affef417476b4643bcf8c4b68050fa9ea8211a1d42ff3ea3495f4903fd09be6c3178fddf62f9feda76d4973b2f0f7421426736c21a5840ea5a0a0e706be05361a6a8febc20d07c065f45788665de80e1a9d8ca1dba231c1a4b201c737b07306c03ab7009b09ec18e8b57974a1ce4633ad31e054e57d3a9cc98783ae2d267562233298495f590c8de3645b4e8207c4400faedd48cfa9728189478a2502c1a4f119cf90572090b1dbcec0301e09848e7e045f00e613a78dfbc943f22961451d2fa13e3ebf5026bd34408182cc4cfbb253da1d561d2722e9ef0b3de37ec776209e57e4925be22a89d9de4ba44cb0c4b9fd10bf1f2cd33b381e9c6fb4d93c26518f94f05b66c4d7f2ef92a3557bab197c9a29fb5027f1c06496c12881a185f74624f15f5eb61ab301f65566f06d1a9fe3cffbb95fbb66d84d6186132d3937ccb6c6dbed2bba2796d73c4dbf9007580e329f2ca3993568a94391678e7efe79a819766bad3f7652835f931abddf25738b9bdf45398f079f00c9e5f69a506b88d7eb19f455e7f121ce97f18fac1cd38f58ce2836f782c89030bc5a2486f7bfdbaf5423f73d7a0fdf49e9d58697f6f1a762d30f1589afde8a64e9cd7a381d3ae33bf69a65c9cec04b11d6e0534155d122120cd4bbea4658127bf40b141aedb3af3d2462c1b5de97cceff98679d4053bb8e4d5560f03ae17614411dfbd49f62fa3909eca926d3cd2e49e4b3f5b71d8b254939936ebceb82b48d4ef5e4d45ebf0097b471ea7d4c18c107ee76cb0ee80dbb6d423ef1ef3fc3aa2bc7b72fd9d651de4c6aee2a332c21c4f02aa8aadfd29a6671b92a8a04f7a928cde7167e1ff6368e6ffe49d9e1ce40eac1d0d7e61f4d9e604885104f97d4e13a6466d93290f4d1ff50f715ff7d41786373fed70523f0d035b8019ff4067c10996a5dc3c922f932291948ee892c5e244d698f1224f7c0e5d1cc4bd6ec183de56b2100a8d87875e2da11a68944acd8a4be8767cd282f3acbe082a6fa4cb451eb43d86ae9f67d7ef82f898742f065433a6b11f09d76f70686fbb747e33109efeae413f7083ce04fa07fd5cd6ef269f5acea71320e09fee6800b4310fa22a9353507a719915834e9b39f772c33b75298d0851050930e0cf1138ebbbcf213cfdf1e8aff96ef2aa936d4752d7727ad4b04ede642c965abea1e916e29ec3bea2c35e9658872147fa62d765cdb9ab2799fbb53e6a7fce030b367b0e8262990e98ef44d6cf10b4cea7e2965fde4aad4363573369c7a83cc3f9197c68bed8de6c1956907e5f85a07484807944cf1146f4ed6b21e9a06de229fc2336ec30c434bb8c2cfb4bed1a2958b1cd7b8806363b291c00fa31d911a4244a67acd2b83df9aecddad5294bb25b736dd35f3596f44464f9b3363f82d4773d4c83aa7fdbc6c0ab27881dc4d66e792e5e662f441e0f9875708aaeddf72a14f61ac4f5a269d16ceb79d67ee53391e09a18bd294b3caacc756cf8539f625152ed56d81fbd4c04467e25bc82a08446101d4ace83c1760f1d90d71b95bdd7a980e8c7afce262c272d827e82c8b022760b53a4b5d18da78168562bdf964234a4c67db8d2152bf967f096f55126fd125ade1b48f727848ac98141e2597b5455b67d64bd27bd4d330139cb366091d625431a39605f37612f6dba829fdb73df81090f4e71ad27e06062bae64467feaec711d5c4295f8b1deb1562d3d7713aa768fb998a4d8ab47f11583a34a66b13a07747a5cd339886a1e1299cf083e5600c683923aeb37bd6bab5aff384cbbbbccde45e110a6ce0a63c136aaf527009cdf35cc791c8ab6cc44b09dc7e59f84fe060ee01b89c7e78f196bdd265b6b90321665baf63638dc57b3275ac4f98ba8aac902510f0b9c4465b1756c0344dd3596234bf8e1d808eb33e3f36f4432e2fd5c9d6fc482c4eecc2b6cc8303175322d8516fc34256ab420db685beb72492e97f2f11b4ceb949cb540c0d9ebca265bf825a78031c8bbeea5a2f124059eabe3fd3422b4ec3a827f72b6f0f24a67b0e7c853ef603bb9dd9db4a751afff32b5d45fd72cc66a2500ab14812f4990b8953e2faa5682d9514e0faa56e0d808524fac21c470ab81dca406de3e992cabf9b9d8cdad4db48b40a9ee7b001457abf96b6471363bf9109ada72e2cc0a6ccfca4e0f0eca45c3bc7880e2da3ccd70147253c7f6c55bb0d8620429626f5cb8145069a59f281ba72922603042a4aaad4b78033908e2c6d18b723d036ecfa1126b910484bf1ca2e659d4e3d3d6fc536de166b5bd6f11d38a239bc7be6bdf75d4ece69b3b9deb3c001113f4713e164209defef9029a0be8400a4dd6e686b58f2308a2c918b3c1f916206bc1022eb115812e43bc7214123dfbe1439d68d6e1ba5225eeac2d9d49119d5ceab70d6c6519c375228f9904435616c0e0f428eadd71c9b6849573cdc40a7702d1f09dcc7740b5b89a17ea508f8b8c30bb15dd7222af9d701c606543e709dc0358188682a311d93038ad2fd1db1f91e63ed6afe1e1230b235413591bbf2e4c8a1581f54550d200987e2e947ee9b6b6e108bb16eb8c1b7ec631afdadba13beb7a6106ecc4aa60724bb79ac056d93f80117605a9c8bcb2cd371a80318f19a95a63c66d64c0ca7b0c1193edc0308bfaf8d77a7bb1de4acd8a08e69dc65a3e57900340267e8ab090139cd2762039a3fa2c2baaebdbf057721f202a6a8934b071a3364076a34e49dce9f7f22e71b37cd44a253c081567d03671947320f218376e26ddc95c889cbad519a658d1997a3ab8e62011d97328d92d59f4ea54ad2e1b4f9a4c2ba514f443296d3bffb33d76beef4752a77eb5de8d413c8feef"]}]}, 0x11b4}, {&(0x7f0000001440)={0x138, 0x37, 0x408, 0x70bd2b, 0x25dfdbfb, "", [@generic="1207573c13b4b5bb3dc9b573391123", @typed={0x8, 0x32, @u32=0x9}, @typed={0x8, 0x60, @fd=r0}, @typed={0x4, 0x59}, @nested={0x104, 0x6b, [@typed={0x14, 0x30, @ipv6=@loopback}, @typed={0x80, 0x88, @binary="b12c9f53e394020cb374ac66f92ec9a765fa761585d45feabbae20c6cbe848bb5ff3002076988ede768b463f6781548454b134e9beb2e70aaf4cd873363736c0b820d157353e572ef6c388b0c86ed8e66533e2f190fdf11bb3e17e85a208003ebc181b29587b868128fc1f041946f84b64ad9fa148317897ad30c48e"}, @typed={0x8, 0x72, @ipv4=@multicast1}, @generic="2100508670f6fd50fb313a99d66f41e7f803c610a324df40100e24570ad3ad57c93d8499da6bb03e8e0bd9333f067371a7eb08a34c8d9d80c3c5fecb768c90d47a6d36ce6473abf886a62288d0dc72a531cd1180cedba51ad4b2dfc9a880d69d430318"]}]}, 0x138}, {&(0x7f0000001700)=ANY=[@ANYBLOB="480200003a00000627bd7000fbdbdf2504001500fc001a0008007300ac1414aa08003d00", @ANYRES32=r3, @ANYBLOB="7d56c995435a3db33683bd81774e28d1565f5c382d814affdfb8ddc68ccb779895f2aa89acaee19df45470e76108ace5b8bc4d1d9141278f8262c947661ce037ee26674d5e0837f0b9a0336a36731bf2aa9a19a5ec65075a77d6e243e76cbd3e3aa0a4bbb39016d9d75a2e2a12e79419074c1da5d6ad23b82447bc56571c3c86fa1240aba30cc0d2db12c04d36db84008741427d174e10a923649475a00d3a52682022fd928071a5f03aa3202e13804fd77a689f4e97d0ddeb295f0209f248844af3ee5dd5be27e3d8977f8658ea9337ed88227d642c289f2ef1620eb5d3bd3262e7937901da9e3408006300", @ANYRES32=r4, @ANYBLOB="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"], 0x248}, {&(0x7f00000019c0)={0x1374, 0x24, 0x700, 0x70bd26, 0x25dfdbfd, "", [@nested={0x1b0, 0x62, [@typed={0x8, 0x51, @pid=r5}, @generic="3de39b42a11f2b3d41d9def8dd0d7f4008b748ecb2ae7e8cb1f27d8656c79ae71292140c5e0e350bd71339141685cecaafdaa82f6d1eef884b52b94f3ed8471e05edad41c60dbb125150c5eb3facad8d5f3a1a128fc5f00bbd00d869580b0484a2d550e7a0ad15ceb963aea5fe72fa2e656f5984dc1d081d00a6186cae894de620367378a84b7d085475d672e54ef7a117cd950d8bd051a7ebc46bb7b3f5da868862f81a3c65", @typed={0x8, 0x24, @ipv4=@dev={0xac, 0x14, 0x14, 0x11}}, @generic="06605a4ffa13e745ef0115ebf7120a4570a14786e69c069995eef43f8d1afecd68bd24da2e92bbf4584c0259f9b294034f02e3ed6848ed3194a1784cf36c58de841982a43d7fe7af814e5e2cb600d5d2bb68e906eaf31e4c04497c388eb63a670deb9cead196eb43f628d7e7077b50af546c93b36f79d6c0e859a5fb49f0219fad4547", @typed={0x8, 0x59, @u32=0x80}, @generic="7cd7a99a78fc1cec8c446476151e622222aebb6967c7d310c6a80d68799df2bf8e61be79bee9404eb6ecdbcf995a23356fcf3965a1912082ed1911aa500f11dbaa7d89262505908ae73927ad3602ccd784987037134240373543cf22647a8bf3a2179d27936fbde839"]}, @generic="bdd94aefe1cb03be165543178e6020a7c37ae3a19d47c1b926c5e0386b9c93af1c15e8643b5ec58d9c3132fcd0f09a2625c757455ec690b0d08b12b081fc39affc8b6d0cc666d60d3fde68bde67ca0", @nested={0x1164, 0x2e, [@generic="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", @generic="12f3de713511b75b34e2d03e0fb53a18e75359d9ca3f25d07127f000ef87fa967f068321116e3956d626241003639f4a22759f9ccbabc1f24127ff4808b964ee38e761f1b5116619c07e46", @typed={0x8, 0x23, @fd=r0}, @typed={0x8, 0x79, @fd=r0}, @typed={0x104, 0x4b, @binary="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"}]}]}, 0x1374}], 0x4, &(0x7f0000002e00)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x20, 0x40041}, 0x4044000) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}, {0x20, 'em1}#'}, {0x20, '\\nodev'}, {0x20, 'md5sum}--'}, {0x20, 'eth0}wlan0vboxnet0nodev]$lo'}, {0x20, ']mime_type%('}, {0x20, '\'system+))'}, {0x20, '*'}], 0xa, "eb35c58ee536b560ad16a579416b5ceafa69b014dd6de00002bd9b4c8e0a19817b9ee9713991975a5731218dc207d28faa59fe444044ee69cfa4d0afcef30aee97748cb861729db2dad25274795b3f6fd78080d197ac05f3ed0468a1d109aec7560f5999d56151611a6676f89c835c505203151118e8ce0202727225cd469df95f"}, 0xda) 03:42:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00'}) getpeername$packet(r3, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000016c0)=0x14) 03:42:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000180)=0x4, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac3dd6b7ea9332770b000000450000000000000200010000ac2314aaac141400084000000000000000000000e000000200000000e0000001000000000025f9007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f0000000080)=0x81, 0x8) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x7fff, 0x9}) socket$inet_udp(0x2, 0x2, 0x0) 03:42:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r2 = getpid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000000c0)=r2) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x0, @empty, 0x4390}}}, 0x88) 03:42:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x101, 0x7, 0xfff, 0x22, r0, 0x0, [], r1, r0, 0x81, 0x8}, 0x3c) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) fstat(r0, &(0x7f00000001c0)) read(r0, 0x0, 0x0) 03:42:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:40 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) listen(r0, 0x3) 03:42:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) fstatfs(r0, &(0x7f0000000040)=""/176) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x600100, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x10, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000100)={0x0, @loopback, 0x4e24, 0x1, 'sed\x00', 0x20, 0x8, 0x7e}, 0x2c) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r3, 0x1, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0xb, 0xac6, 0x20}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x800) 03:42:40 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x401, 0x800) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80000000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}}}, &(0x7f0000001e40)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002280)) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) read(0xffffffffffffffff, 0x0, 0xffffffcc) 03:42:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x9, 0x0, 0x9}) 03:42:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x5, 0x3ba94e49, 0x401, 0x4, 0x0, 0x101}) 03:42:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00'}) getpeername$packet(r3, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={0x0, @broadcast}, &(0x7f0000001640)=0xc) 03:42:41 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) socket$inet(0x2, 0x0, 0x40) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='s^$\xf0\xe1HT\xeb\vlup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac0014aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000000000000ffffffff00000000e000000100000000ac141400000000002bd9e8f2bd38e68e07ede7f80f235e5307a0952e8e37a1009aa1bac06b43bf3b9ca982da2d21860cc9ee9d0d19073c75af2550b78c442ebeb49b5357281d644f6094d3ba2128d1a3c4d2e88d2c76892f071e91a8369b"], 0x0) 03:42:41 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x401, 0x800) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80000000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}}}, &(0x7f0000001e40)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002280)) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) read(0xffffffffffffffff, 0x0, 0xffffffcc) 03:42:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$binfmt_misc(r0, &(0x7f0000000180)={'syz0', "a7d4129cac05459bbc5cf9a1dcfa094c4eaf9ca184fc63a1a1ea41c54a962440f2d6cebfbe6892015e89cbffe8ec931a04e78274af0074f6a30e17c9515e0c06426e3fddf015c61e29ee12e65ba6fbd0593e1c4caa38aa6fd954ebc439fefb18236132781f732a172d6e33b93c5540ea0319409d18db0a4a5ce19c1a89cf454b4c960d715b3ee2d4f835b4da08a2a34ede67f909381de138422d9f3a1abdb9bd3247d155897079fe7050fefea9749a57fb4feb64b746b4d640d1ee46b0852c8b2d2cd66cb52e4c12321a172109bd1caf5bc2cce95a564b4c344265537c7c5a5eed0042acc676b2232616d99c59dd3ef321b61ece37c87fae"}, 0xfc) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='./file0\x00') getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x9, 0x20, 0x2, 0x1, 0x1b, 0x1, 0x7, 0xffffffff, 0x3, 0x1, 0x800, 0xfffffffffffffffc}) [ 2065.820222] kauditd_printk_skb: 349 callbacks suppressed [ 2065.820232] audit: type=1400 audit(2000000562.239:73950): avc: denied { map } for pid=9540 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2065.988026] audit: type=1400 audit(2000000562.239:73951): avc: denied { map } for pid=9537 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x414, r1, 0x904, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff81c1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf7}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2000000000000000, @local, 0x41f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xeb4f, @rand_addr="fb97976936f0321a8b9f9d0cccd682b6", 0x3}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}}}}]}, @TIPC_NLA_LINK={0x184, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc62}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7991}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd6b3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc25}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcd1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x64d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdb44}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe59}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xce}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5ff50d5a}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}]}, 0x414}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x28000, 0x8) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0xf4c6) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 03:42:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00'}) getpeername$packet(r3, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x14) [ 2066.200288] audit: type=1400 audit(2000000562.269:73952): avc: denied { map } for pid=9532 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:42 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181, 0x0) shutdown(r1, 0x1) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x3, 0x1, 0x1f, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) [ 2066.478635] audit: type=1400 audit(2000000562.269:73953): avc: denied { map } for pid=9535 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2066.565112] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2066.567897] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2066.572519] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2066.580631] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2066.590359] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2066.599169] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x76, "96df8ddd3679281db728620c62c19b43b3862b39e0cd58ec4de8784ade77a74155570653ea22a81cdbbe03dcacb8147f4d657cfa35eb858f98a082f3ea3b8ba65c10b5efadd8153310e1ff7783185c57d4b04d9aa0baa5fb93449b17e6017cd0660c9a93530106dad3bd3a58f3aa8984e2d7c4595437"}, &(0x7f0000000100)=0x9a) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:43 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x401, 0x800) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80000000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}}}, &(0x7f0000001e40)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002280)) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) read(0xffffffffffffffff, 0x0, 0xffffffcc) 03:42:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040)=0xff, 0x4) syz_emit_ethernet(0xfefa, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c200000c03000060020300001b4464e7a963edb00000000000000000"], 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r2 = getgid() chown(&(0x7f0000000000)='./file0\x00', r1, r2) prctl$PR_CAP_AMBIENT(0x2f, 0x7, 0xd) 03:42:43 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) 03:42:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x7fff, 0x9, 0x2, 0x81, 0xfffffffffffeffff}) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") 03:42:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x150000, 0x20) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00'}) getpeername$packet(r3, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) 03:42:44 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @multicast2}, &(0x7f0000000040)=0xc) 03:42:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x5, 0x3ba94e49, 0x401, 0x4, 0x0, 0x101}) 03:42:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000240)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = accept(r1, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80) recvfrom$unix(r2, &(0x7f0000000100)=""/136, 0x88, 0x2, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x400) 03:42:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='syzkaller\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:', r2}) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={0x9}, &(0x7f0000000040), 0x8) read(r0, 0x0, 0x0) 03:42:45 executing program 1: r0 = socket$inet(0x2, 0x1, 0x1) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x5, 0x3ba94e49, 0x401, 0x4, 0x0, 0x101}) 03:42:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000040)=0x1, 0x3) prctl$PR_SVE_SET_VL(0x32, 0x1d284) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) rt_sigreturn() syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) 03:42:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x4, &(0x7f00000000c0)="0add1f123c123f319bd072") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$TCSBRKP(r0, 0x5425, 0xfffffffffffffff7) 03:42:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000014c0)={'team0\x00'}) 03:42:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x5, 0x3ba94e49, 0x401, 0x4, 0x0, 0x101}) 03:42:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) write$selinux_create(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a756465765f7661725f72756e01003a7330202f7573722f7362696e2f6375707364203030303030303030303030303030303433333130202e2f66696c653000"], 0x51) getpeername(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000080)=0x80) read(r0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r0, 0xd, 0x1}, 0x14) 03:42:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000002c0)=""/4096) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x6, &(0x7f0000000000)="8adc1f123c1266cc21039c") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:46 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x401, 0x800) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x80000000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) fstat(r2, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000540)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./bus\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}}}, &(0x7f0000001e40)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002280)) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) lstat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) read(0xffffffffffffffff, 0x0, 0xffffffcc) 03:42:46 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)=0x37b) 03:42:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40040010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x4, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4810}, 0x4000004) 03:42:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000c893d1c7"], 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x4) 03:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) [ 2070.835523] kauditd_printk_skb: 441 callbacks suppressed [ 2070.835532] audit: type=1400 audit(2000000567.249:74338): avc: denied { map } for pid=9698 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r0, 0x7fff, &(0x7f0000000040)="f040706e7a64632646faa0b10164bcf9269e7ad575b5db47b4dd670a73dbe3eedd06c89315b39753d3fff23248dced05f904baed4b37be0a0546122d09de8fdb4c7f36b4af320f14bc88cc4ff9975e5e15edfa9f7b36726767c4a6602c3e3a6164ea5e47f5280f8fde028a6722eb909584f66fc0701454dfe16e295564b4725939bb2ced5fb9464b0caa5a28ef15f52ee16fb15d6a36931e44b2a025a7368dcdba085f8e0e40339640efcfec563eb7eeec971730fca89d9a717fbf7613462e4599817a7fd540e099e43c3464809fde15a94f279123d331de29b8d6e5f45f31b08756cb660d56590437f2bd1e2f56ed3cf10777e96f5e8fb46b") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2071.020763] audit: type=1400 audit(2000000567.289:74339): avc: denied { map } for pid=9698 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2071.225819] audit: type=1400 audit(2000000567.289:74340): avc: denied { map } for pid=9698 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2071.316399] audit: type=1400 audit(2000000567.299:74341): avc: denied { map } for pid=9701 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:47 executing program 1: r0 = socket$inet(0x2, 0x6, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2071.438017] audit: type=1400 audit(2000000567.299:74342): avc: denied { map } for pid=9701 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2071.573533] audit: type=1400 audit(2000000567.349:74343): avc: denied { map } for pid=9700 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'broute\x00', 0x0, 0x3, 0x1d, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/29}, &(0x7f0000000180)=0x78) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2071.717147] audit: type=1400 audit(2000000567.359:74344): avc: denied { map } for pid=9701 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) 03:42:48 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x82d97) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) r3 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0xffffffd8) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000300)) pwritev(r3, &(0x7f0000000280)=[{&(0x7f0000000100)="7e1995b62210d86e2e45f57527eb58a0b3b3", 0x12}, {&(0x7f0000000180)="4fcc015542be8cd5a60085929a7e005872fc5dd461773bb560684377d2e86681bdd1694d27a521dc6c6bc0ac2f67de6b303394b2c807c0f052cb847b76cc802c767048a92237fb306e5151", 0x4b}, {&(0x7f0000000200)="93f271de07df5753d0089107e1c48d3ea5b4fa03c9671b0337ceb30d322f4a84a3f74bf6fe78e76ebaf578424cf4e49cf6a3b160926629ed7fb2f77986b4b57d0f11b6c73d75ba7802dd08fb6ecd97abe15473c4bde04ef0b2cb8c9d0c01dd", 0x5f}], 0x3, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) [ 2071.819136] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2071.840682] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2071.848566] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') read(r0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000001000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 03:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000010c0)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000011c0)=0xe8) 03:42:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000002c0)=0x1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000180)=""/117) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000100)=0x80000001, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffff0200ffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:42:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) read(r0, 0x0, 0xff06) 03:42:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @rand_addr=0x7}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e20, @rand_addr=0x2}, 0x2, 0x0, 0x0, 0x0, 0x56, &(0x7f0000000000)='hsr0\x00', 0x2, 0xfffffffffffffffe, 0x800}) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x8000, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x80000000, 0x570, 0x2, 0x8}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000200)=""/215) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) read(r0, 0x0, 0x0) 03:42:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/ptmx\x00', r1}, 0x10) 03:42:49 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x8) 03:42:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907804000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:42:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x200bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080), 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000040), 0x4) 03:42:50 executing program 3: socketpair(0x348020b2fdd32970, 0xa, 0x5, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r2, 0xa00, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xcc4e}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4008000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fsync(r3) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x3ef, 0x6, 0x1, 0xf3, 0x3, 0x3e, 0xffffffff, 0x2d0, 0x40, 0x1af, 0x401, 0x8, 0x38, 0x2, 0xa2f, 0xfffffffffffffffd, 0x80}, [{0x5, 0x2000000000000, 0x3, 0x40, 0x8, 0x3ff, 0x8b, 0x7}, {0x6474e551, 0x7fffffff, 0xffffffff, 0x4, 0x347, 0xfffffffffffffffc, 0x4, 0x7}], "f43c83556e4a293f755b5b9e6addf9c665736f07bbda", [[]]}, 0x1c6) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10, 0x80000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="6e61c86aa1fc2f21e6cb00caff2a8a9d9c19d9000000000000000000000010000300"/88], 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) fcntl$setstatus(r3, 0x4, 0x2800) 03:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001040)={@remote, @initdev}, &(0x7f0000001080)=0xc) 03:42:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') getpeername$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:42:50 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000ac2314bbac1414110404907800000000450000000000000000010000bab88dc1ac1414000840000000000000e000000100000000000000007f00000100000000ffffffffe216d2148e52f7c60100000000ac1414a7771936"], 0x0) lseek(r0, 0x0, 0x4) r1 = accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e23, 0x40, @ipv4={[], [], @empty}, 0x3}}, 0x0, 0x5, 0x0, "50101235cd793f41618bca2431efe403205e8c0144bfe274d61b947c2913c6a3b34344a379c7b9ce80ae672bb19f08043429bb7fbc338bab87381e8c2a040e2c33825b87f880e182d4143b4968c67378"}, 0xfffffffffffffe97) 03:42:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x80000001, 0x9, 0x1, 0x1b1c9458}) fcntl$setstatus(r0, 0x4, 0x2800) [ 2074.431042] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:42:50 executing program 2: r0 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='smaps_rollup\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r2 = getpgid(0xffffffffffffffff) sendmsg$nl_netfilter(r1, &(0x7f0000001980)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001940)={&(0x7f00000001c0)={0x177c, 0x9, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {0x3, 0x0, 0x7}, [@typed={0xc, 0x1c, @u64=0x9}, @generic="0ed25c853cd042be16e21acb78d84e17d7027aaee829414d97ea87fc0a2941042a4e4a6716706ce822d33df33e44507a8a3c9bd87bf3bf1699939ab0eac1251f1185c01d7dbae595611812d9bb6304cb65f468987eb83c115d1fe9c6e6f4d5f5ffda663c74b7506ff46c34359fe5e4e9f54f0594b9d530819b9b62d2901e3f02ae093a38c81f1c2e7c5b7871b42e177cbc7728141bf2f88bb9d95888fdfb78680f6c5e830488ceff001df247de4d12e2b3273cc0080376414ac00280e44c20c10bc8a826513386bae8", @generic="31fcb11d08e7519d7faa9b60a15cd8a5856f431bd9142192b6f7aa3ee30a881da0959ce323cee114c01a21ae4e4e649a7af6180e28787e4bea5b9c8831e2c99589306ba0a7cc01f2ea2dac88e191fd2f55225abc344d32520e8979831153d00e56b6680c44fb8ece691313214998947bec6d16c94d8ca85bc2a93827c465fb12b1ef67c4284f6c93427558766b3d46f7abcde92a09498570e1d713a6d31c87283c5bd4f1c761ba41ac7794b426f6fe2dc1c7e09295a02714aefb90a1218d467d12fbccb1a6c1371ec2f5ede2b51b1656f72c7357eb8d7529c9202ca6a4055b38700f0ea00bf6cf47279828c6cb2a87174899bace593954", @typed={0xc, 0x17, @u64=0x1}, @generic="27fd27c3301a53dd6e0cf78e80a77a70ca4dc9ea379ad14931956ae0acc25d3e0add9067356346878427173255e7278cc1dca5653399c7f01102bf2b959b8eaee21f68579b6578e0ba4a80f6919b77c333a5ab9711ebae7e224601eed202dedbab865d5e6c22fd0547f301b8838dac622d9b1477c0cf86faf82c5ddd71f4bc388ac92d06c9a9f485c41eb9759785d4a86484346e598508bfd0fae4c12c84f76d9a22", @typed={0x4, 0x12}, @nested={0x1ec, 0x55, [@generic="ce3178a3076e122a34bb3e313e381add3766deb4d9a78b4ffac7f4d1bafcf8d94c5325f4e1053189c58dcb412d45040e7a723344fe78071d32006026fc2c82af1e5fce0e86ba006d6cfbd06b1ff931b019457844c1442ca41ea98b070b8689b305a8bb9662c2d983c39022", @generic="fd7a4d0a4562c7d8dd918527ab25d59709cb5a91a82f8f381df0263619ab3c31c4cbf33ec2e0e269d9502e965caadc6c6789dee339f76dce054cf4e99133ed6661db03f39595d356c54069f5409d9ae4d6248665a26c7c4f4a63c5246901f0103b8555ef3fa69327515fe9923e7eb630bf60419977bed6100c150056b55ee12ab6190f5fd705f714a637fe60696f48ba8aa4f9cde133e4c539a94e1bdfd7aa88db90f7768c3a4c4095d6", @typed={0x8, 0x3b, @pid=r2}, @generic="d1c406cbf4ab04a64db6079d0136cc6f35b3dfbb922c2d14312e21eeddbe184f4673", @typed={0x14, 0x69, @str='smaps_rollup\x00'}, @typed={0x4, 0x67}, @typed={0x8, 0x2d, @fd=r1}, @generic="1ec892dd534a09711c526dfaf09ea8bc0d3ff3be8f656305ae4332af6209b6ee0138d3da3f40d00a6fe0eade0a2c0a6b8273cbb7d3fae8305953034437b83de6c532c3c958460e9d61329f7263befaa4b07dc4c4b2172b0caef1644922b57dfc8c147a04b03bd020e49e22c6fb7eedc46273f9c8362651fcb95dab6481a81d01aed4d8a5e319891b"]}, @nested={0x270, 0x8d, [@typed={0x10, 0x56, @str='cifs.idmap\x00'}, @generic="3cf978d516d70407654d85b4af160379475f7f84b5910fda1c94c8004d5ea55ea0777d95008f9a846553871a3f5f29f19f3b5fbfdf0885fdff75df380665f81b48b491ff6ea03431488d49c8e97beb1b4190dd39e4b71a81c9e23e50053de2c5ff21a9b306b9802d582ac9676fb38ae7172e0b5460f6d8e262c57ca56150e6020ed1a91c343c20403f83c2d3bdcaedb0cf76b1be6c57cc0cf0591683b3a22e0aaf4bb3f78a7e5241870091ebefb6c61ebb7ccd0993786dc6d29419e3c4fa784ff544224fd5525cce7d71bdb4de819c6612dcb4153851acc87b2f0ee3c5818b9f4bad83210d4f6530bf053435b0cb7969ce9d0792e2c13e07be", @generic="830eda5195dc089b99ff95396df973d512ad5e195c011de2d607e83f8dbb3dc55b433d55d931f2be026cc1ce3a5d2d40bf236eb274a0cd32f4e1b9519d74b25f1f3774cf299d9cc82f28c310a2f943c06bea2a31c597d070d6192810c14004d50335bc81f1d1c0aa2a065d17c4f58638712f6f00bd8b626853a65da6307bfc8e6e3ba835ecbe7bc15cfef70fafd1fa30841ce213302202d73e2219df588fc93551c6e148d2cb2929a0d34377e362a97a", @generic="55ec6e80b37abffe30b7c87c6370a5452f9b449b969c71ccb8d044b16b51bfea17f8b251614394e2c131822000e78de3a51c00ddece91390ec99869fefcda38bb7aab730f6edc4226019f05e8839f50232", @generic="3a56ab1a85155c7eaf50f571984b3a8d85605db1ac6579a864395ccf1397588e325cdab72310ae9fdbe7213ebc429d9365b7cba2e81f36178beb23a517d0754fa10a99c5d2dbb962ede2ab8ce7e2849902799271361ed49f74cf3ae3672b3e6ce748"]}, @generic="5d46f4b3ec07af03e07155763c39e079ab8df6d396178d10773a2162f7ee2ac3fab7953cee972d48714b7d5bcae2fbf7848f0a01957d372bc8c12171777254626ca258b2b03ce223d9af040ee1bb540d5921b3aeb8a0b350769522876dfaed565b802fec16fb8d5d5da699fc8c75542e7d4ce912bc37c1f8e8a1ce859d63d52245f456ddcad43db21bcebf4943", @generic="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"]}, 0x177c}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:51 executing program 1: r0 = getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000040)=r0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x8001}, 0x8, 0x80000) r1 = creat(&(0x7f0000001a00)='./file0\x00', 0x100) recvmmsg(0xffffffffffffffff, &(0x7f0000007d80)=[{{&(0x7f0000001b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/197, 0xc5}, {&(0x7f0000001cc0)=""/98, 0x62}, {&(0x7f0000001d40)=""/173, 0xad}], 0x3, &(0x7f0000001e40)=""/211, 0xd3}, 0x9}, {{&(0x7f0000001f40)=@ax25={{0x3, @bcast}, [@bcast, @netrom, @null, @netrom, @null, @null, @rose, @bcast]}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001fc0)=""/70, 0x46}], 0x1}, 0x8}, {{&(0x7f0000002080)=@xdp, 0x80, &(0x7f0000002180)=[{&(0x7f0000002100)=""/90, 0x5a}], 0x1}, 0x100000000}, {{&(0x7f00000021c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000002240)=""/129, 0x81}, {&(0x7f0000002300)=""/150, 0x96}, {&(0x7f00000023c0)=""/133, 0x85}, {&(0x7f0000002480)=""/202, 0xca}, {&(0x7f0000002580)=""/35, 0x23}, {&(0x7f00000025c0)=""/187, 0xbb}, {&(0x7f0000002680)=""/5, 0x5}, {&(0x7f00000026c0)=""/69, 0x45}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/198, 0xc6}], 0xa, &(0x7f0000003900)=""/27, 0x1b}}, {{&(0x7f0000003940)=@l2, 0x80, &(0x7f0000004a80)=[{&(0x7f00000039c0)=""/119, 0x77}, {&(0x7f0000003a40)=""/13, 0xd}, {&(0x7f0000003a80)=""/4096, 0x1000}], 0x3, &(0x7f0000004ac0)}, 0x1}, {{0x0, 0x0, &(0x7f0000005d00)=[{&(0x7f0000004b00)=""/51, 0x33}, {&(0x7f0000004b40)=""/34, 0x22}, {&(0x7f0000004b80)=""/120, 0x78}, {&(0x7f0000004c00)=""/227, 0xe3}, {&(0x7f0000004d00)=""/4096, 0x1000}], 0x5, &(0x7f0000005d80)=""/253, 0xfd}, 0x1}, {{&(0x7f0000005e80)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000007380)=[{&(0x7f0000005f00)=""/149, 0x95}, {&(0x7f0000005fc0)=""/187, 0xbb}, {&(0x7f0000006080)=""/223, 0xdf}, {&(0x7f0000006180)=""/194, 0xc2}, {&(0x7f0000006280)=""/58, 0x3a}, {&(0x7f00000062c0)=""/4096, 0x1000}, {&(0x7f00000072c0)=""/153, 0x99}], 0x7, &(0x7f0000007400)=""/152, 0x98}, 0x3ff}, {{0x0, 0x0, &(0x7f0000007a00)=[{&(0x7f00000074c0)=""/115, 0x73}, {&(0x7f0000007540)=""/247, 0xf7}, {&(0x7f0000007640)=""/135, 0x87}, {&(0x7f0000007700)=""/254, 0xfe}, {&(0x7f0000007800)=""/93, 0x5d}, {&(0x7f0000007880)=""/109, 0x6d}, {&(0x7f0000007900)=""/229, 0xe5}], 0x7, &(0x7f0000007a80)=""/145, 0x91}, 0x800}, {{&(0x7f0000007b40)=@isdn, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000007bc0)=""/74, 0x4a}, {&(0x7f0000007c40)=""/125, 0x7d}], 0x2, &(0x7f0000007d00)=""/105, 0x69}, 0xa359}], 0x9, 0x22, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000008040)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000008000)={&(0x7f0000007fc0)=@gettclass={0x24, 0x2a, 0x600, 0x70bd29, 0x25dfdbfb, {0x0, r2, {0x3, 0xffe0}, {0x3, 0xffff}, {0x0, 0xfffb}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4044000}, 0x1) 03:42:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x50) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='\\]em0\\*vmnet1cgroup:trustedsecurityeth0{keyring\x00') syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000001000)=0xe8) 03:42:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:52 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000004c0)={0x0, @loopback, @remote}, &(0x7f0000000400)=0xfffffc85) 03:42:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0xfdfa, &(0x7f0000000040)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000016}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x118, r2, 0x101, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @loopback, 0xffffffffffff3924}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x20000010}, 0x810) 03:42:52 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)={0x25c, 0x9, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {0x3, 0x0, 0x5}, [@generic="e4177565a0312521127467f69a1026076d82a436ce4f14f27bccfab730b9b29da94bcc470777a90716d7a3b8e113a4cfe5cb6540f2f0353f5c2900d141bdebff4e6f08e152722e2dfc2c", @generic="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", @generic="e0c2b8643551ff728d1dc7359225dfa19581345cec15f0cc6b10140917f052ab86bd4c6435fe0eb9193e4d11c99cd0604fbc29e83a8197f73acb81c543d36b511cdf0870c4e9add697c32fa337ea45fc038050c06a914b35dd5a423d603a79680d7c7c0efb9d1bab441e7fbf431b398fbbc97eea3aec5d282b2d819dac43ef55e08abb6f37259276e0fb9b629c0e20ec590b59d77289", @generic="4fcfebc96750312177ab6c1bb98daa353b112c5b1ea289fb553e8ed9f4dac4350e9503689338f08b0dce475cf97bc33e2899767356b40e2fab303acf29e933961d898124993bf7cf664e24a1cf3989e9e4117b30a1a608960f93dc2527c2a382015a5be3c94af51c"]}, 0x25c}, 0x1, 0x0, 0x0, 0x44}, 0x1) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) [ 2075.849603] kauditd_printk_skb: 381 callbacks suppressed [ 2075.849624] audit: type=1400 audit(2000000572.259:74684): avc: denied { map } for pid=9838 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2076.017732] audit: type=1400 audit(2000000572.299:74685): avc: denied { write } for pid=9839 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:52 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe80f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xa65}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffeffffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1c00000000}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x900000000000}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0xc840}, 0x40) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2076.164287] audit: type=1400 audit(2000000572.319:74686): avc: denied { map } for pid=9838 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:52 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000100)='\x00@\x00\x00\x00\x00x\x06\xf7') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) [ 2076.339906] audit: type=1400 audit(2000000572.359:74687): avc: denied { map } for pid=9844 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1, 0x2001}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 03:42:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@initdev, @in6=@mcast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000d80)=0xe8) [ 2076.488167] audit: type=1400 audit(2000000572.369:74688): avc: denied { map } for pid=9844 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:53 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0xfff, 0x7f) syz_emit_ethernet(0x351, &(0x7f00000002c0)={@empty, @broadcast, [], {@mpls_mc={0x8848, {[{0x10000, 0xa5, 0x5, 0x7fffffff}], @ipv6={0x1ff, 0x6, "8130b6", 0x317, 0x3b, 0x7f, @dev={0xfe, 0x80, [], 0xa}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, {[@hopopts={0x3e, 0xd, [], [@enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x1, [0x0]}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @calipso={0x7, 0x50, {0x400, 0x12, 0x3, 0x7, [0x1, 0x1000, 0x6, 0x9, 0x7a9c, 0xfffffffffffffff9, 0x3, 0x1f, 0x4]}}]}, @srh={0x0, 0x4, 0x4, 0x2, 0x4, 0x8, 0xbf, [@mcast1, @local]}, @srh={0x6f, 0x6, 0x4, 0x3, 0x400, 0x40, 0x200, [@dev={0xfe, 0x80, [], 0xd}, @loopback, @ipv4={[], [], @multicast2}]}, @dstopts={0x5e, 0x6, [], [@generic={0x2, 0x2e, "5072f9662cf8159274d73e6df4e4011e1a4f4f5c640bfc643b35f63eea927a84ef710591bab9d445b7bdc5f60c46"}]}, @dstopts={0xfc, 0x3, [], [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}, @generic={0x8c6, 0x4, "65efb16d"}, @jumbo={0xc2, 0x4, 0x1}]}, @srh={0x1d, 0x6, 0x4, 0x3, 0x4, 0x10, 0x4, [@rand_addr="a0652b4f9e36cb87a51f5c6361036bf6", @ipv4={[], [], @loopback}, @local]}, @srh={0x62, 0xe, 0x4, 0x7, 0xd93, 0x20, 0x5, [@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, @remote, @loopback, @mcast2, @remote]}, @routing={0x0, 0x4, 0x3, 0x34b35486, 0x0, [@local, @rand_addr="d6b53fd6c3daf31ff2b17c29643675bf"]}, @routing={0x3b, 0x4, 0x0, 0x7, 0x0, [@empty, @empty]}, @routing={0x2f, 0x4, 0x0, 0x2, 0x0, [@empty, @dev={0xfe, 0x80, [], 0xe}]}], @tcp={{0x4e20, 0x4e24, r0, r1, 0xd, 0x0, 0x8, 0x4, 0x3, 0x0, 0xcbe, {[@generic={0x4, 0x9, "d46ee915da3cb8"}]}}, {"9fc2658df465e2beff94de22b5a007d6ba7edef678131845fa16c520cd991f0b7087058c426f353a42256c36c1e175aa25aef52002c5078bee7fb8aa90a84d4ab1e6744be2642137f74deab1751070fcf425a6ce1d97181bc99f31d74276bdeac7c5a624bab2d9a19b99354f3a29e500195f80c3f4c016333653aaf73d7ae4a72ee2da384e1609069c3bbc696224f955a83484b02bdff2"}}}}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0x20f, 0x804, 0x49f, 0xf54]}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0xc, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2076.636220] audit: type=1400 audit(2000000572.389:74689): avc: denied { map } for pid=9844 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2076.817347] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2076.835338] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2076.837152] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2076.863895] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$netlink(0x10, 0x3, 0x7) sendmsg$nl_generic(r2, &(0x7f0000001200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10ec, 0x3a, 0x404, 0x70bd27, 0x25dfdbff, {}, [@nested={0x10d8, 0x80, [@generic="0a21a3efa34c29e607f8d16ee5287a1e6e20030852d43e26b41b9c659d4bc35e39671fd49b3d529520874120e4e74588bbb6be9845f0885dbfbb0c5a17fb14ef162db94effabc8e06c391605073254de27a3800988b3a4ef4fbc61b940b27d7754ea8f6353f66c3bb865952e34c13d9d85afb3672af7b9534c0ef86c872f6b8f8d19a41485e1a6f93ea36f2dc2e0dbdab93f3cd1c6a59ee632be9aed10be97ee1b044a1f23e379b7fde8cf5439882b8be34185555e722f6b0c0156", @generic="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", @typed={0xc, 0xd, @u64=0x6}, @typed={0x4, 0x5f}, @typed={0x8, 0x1a, @ipv4=@empty}]}]}, 0x10ec}, 0x1, 0x0, 0x0, 0x4001}, 0x4080) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:53 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x140) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x7fffffff, 0x755843da}) 03:42:53 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "36e4473da53e23ebdac7f65cdc3830e02775f3742c9c204f50f58c4cb8986895f70a0eae3da0d52cf8c3a70a06038fdd4e7978897ab43e8ab0ff685b84319c43", "aee3419ab005486ca162e5326df49082941bfddf72f95598487d94297225d151"}) 03:42:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:54 executing program 1: r0 = socket$inet(0x2, 0x80008, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) socket$inet_udplite(0x2, 0x2, 0x88) 03:42:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='smaps_rollup\x00') read(r0, 0x0, 0x0) 03:42:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@local, @in6=@initdev}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) 03:42:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x21, &(0x7f00000000c0)={@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x20) 03:42:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000400)=@acquire={0x210, 0x17, 0x410, 0x70bd25, 0x25dfdbfe, {{@in6=@loopback, 0x4d3, 0x33}, @in6=@local, {@in6=@dev={0xfe, 0x80, [], 0x1b}, @in6=@remote, 0x4e22, 0x3ff, 0x4e22, 0xf8d6, 0xa, 0xa0, 0x80, 0x97, r2, r3}, {{@in=@rand_addr=0x20, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x4e23, 0x8001, 0x4e22, 0x0, 0xa, 0x20, 0xa0, 0x0, r4, r5}, {0x7fffffff, 0x1000, 0x80, 0xda, 0x951, 0x5, 0x100000001, 0x6}, {0x7fffffff, 0x0, 0x1, 0x85}, 0x100, 0x6e6bbb, 0x0, 0x0, 0x3, 0x1}, 0x4, 0x4, 0x2aeb7a7, 0x70bd2c}, [@replay_thresh={0x8, 0xb, 0x1}, @sec_ctx={0x7c, 0x8, {0x77, 0x8, 0x1, 0x2, 0x6f, "ac6ecaf379a32507f0a8fd37eb67daa01f5694b387024e5f2a2036da48408d69b02f9ade319362fa7cf034eecac1c1076526e3109958d7d103f23ceaad8ea2ed2dfa8c4d988314a849635a9ce443a5acd0f0785f7be87f95bea8a0785fe6772a6677b50c3a9dd9f417334e7aa1d1da"}}, @algo_crypt={0x64, 0x2, {{'cts(lrw-camellia-aesni)\x00'}, 0xd0, "673841ed2fdc2ceefbab7f351486748b0098082cb492e4aaa969"}}]}, 0x210}, 0x1, 0x0, 0x0, 0x11}, 0x0) 03:42:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000000c0)=0xfae, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback, @local}, &(0x7f0000000100)=0x4) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev={[], 0x25}}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008914, &(0x7f0000000080)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:42:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6b, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x15) r1 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) dup2(r1, r0) 03:42:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) sync_file_range(r0, 0x3, 0x3, 0x4) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/147, 0x93}], 0x1, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000100)) read(r0, 0x0, 0x440) 03:42:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x3, 0xb2e}, {0x80, 0x5}], r1}, 0x18, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:55 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0xca, 0x4, 0x3ff}) 03:42:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00'}) 03:42:56 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fsync(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_pts(r0, 0x40) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000280)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f00000000c0)) ioctl$KIOCSOUND(r3, 0x4b2f, 0x815) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000100)=0x802) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) 03:42:56 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7fffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:42:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x201, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x4c, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x3ff, 0xff]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffffffff0001}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314057900a438b6cb1a7800000000450000000000000000010000ac2314a1ac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 03:42:56 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) 03:42:56 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x9) 03:42:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f00000001c0)={0x400, 0x80000000}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) write$cgroup_pid(r2, &(0x7f0000000180)=r3, 0x12) ioctl(r0, 0x80001000008912, &(0x7f00000000c0)="eadb1f123c123f319bd270ac198343efd8c7c4502906b327de1ccace8c132f8e4f7007000215a873b2a1fe4e18b62f79ccb775f6aadb2eae4a7f93b31d04cbc14f5edd3531a31a5d7bed7c99637981dd6c844b20178e") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200, 0x0) write$eventfd(r2, &(0x7f0000000200)=0x20, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setstatus(r0, 0x4, 0x2800) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:42:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') sendmsg(r0, &(0x7f0000000740)={&(0x7f00000002c0)=@llc={0x1a, 0x33b, 0xba1, 0x8000, 0x0, 0x5}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)="d0f5434a78a951df594a0ea186e687f7fd364b9a2e1dc9f87d956fbe8f2b54da67f4", 0x22}, {&(0x7f0000000340)="07cd4db4d6a3b10d44e24c89343c8b0cb383201deb50b0b78de301584d01dbf6906d0b64dada52987757367b26a7e2161e95fc6c7a35b379be17e76c6346eb89800cd919b1c30f193780847e472933385938702f4720423ae89603eaa6889828605a1b3315ccd8f6", 0x68}, {&(0x7f00000003c0)="6f31ac91819fa523809fcdfacea0073497c723f2cf353fec8eed354d9d9136271aa27016fb4ac96be1cb194cc3af5cd8506c03b1dbc4bccaa1557119ef588866a8b2c5500fc751e8c62263471bfa999229ae8531a32eec04fd410574e9cdf5b57b66ab16b747f0b71c825d120a216711bd0f8d93a6fcb5e69c489a8cd17c97c8b827189e9a68d0d8091dc8dcba82f054ade3f43fe9115a151eb8ee3346ca9bf4", 0xa0}], 0x3, &(0x7f0000000480)=[{0x58, 0x0, 0x2, "4424e61a8f152b6bbec877cca2cb7441bd4bc00087087501f0cfa8989c1cf50546081f4fc6c8522b392831ceded33731c9092a83435914aff5f99c997856c778b6"}, {0x48, 0x0, 0x10001, "fffb3a426861c97c3444c4bba4448b6d6f8c23d01463e0c559211308b11d2871767563a9714ffd2ff22d87bd96ea2e8a6c2858f6"}, {0xf0, 0x117, 0xdeb, "bdc83a74173df0c03e88e1b485e263a8a00153bcbdf6180f0240f348685eed73d3d7d8024c364930191eade64fe620792ec02caea8eba15f2bfd671b32812ac5b93c67fd63b91a54275cc890ed0521b3f74d3a527a277a8414bf67c44345b98a2d6f0adf4344010f7f40cb924e4f7905d19977e485dda58c691aae84ca16489947e379d384fc350b484da56dc753407cfde477736d90f6ca53eeab41af01e2aabe7ceccdff1c86116281490220ae644e91c65d1ee39178dd867db6c347516f1b07d5bd98c5c561ecc55b212fe8bd2050acf1d04c6221c9351fbb4b12"}, {0xb0, 0x3a, 0x7, "5cec00042a27471a95ecac28dd67893769923818103da2c3473b3037712ea11124c8800cd901e7701d5ce51ef8b0d07701e3785866e83cd0b8f82f819716565c2c27c5a183df986ce9feba6ea278df37e4fd6c22e954edd2ddd355c7cb5263d6c38e127526473086134c43127cebc3d6b4251d050221845a8e5a93cde7a5c3b822da40d52487b9ad0a671dd1496aa3726df28641236eb8974c91"}, {0x78, 0x1ff, 0xffffffffffffffff, "9e3be699a6ab5204e0e5420bc39eee495b53639cda08ce600e3c26b80e69ed577b1ab91faa8778fedc22ad007b504c92a3183e665282d891f912be24bc2fdd64edf0b2effd5d4bf9a4b354da8d57832498fb8b8894926a3d904ce9293f37108bf3aa"}], 0x2b8}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000280)={0x7fff, 0x7b5, 0x3}) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioprio_set$pid(0x3, r1, 0x9f) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@rand_addr="4220f91b7becbbb8c4dbf6ebe3c55151", 0x4c, r2}) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x8, 0x32, 0x318e, 0x5733fa0a, 0x5, 0x6}) [ 2080.852678] kauditd_printk_skb: 387 callbacks suppressed [ 2080.852688] audit: type=1400 audit(2000000577.259:75069): avc: denied { map } for pid=9979 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:57 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x19659add650d19f4, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2081.047951] audit: type=1400 audit(2000000577.269:75071): avc: denied { map } for pid=9977 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x1d0, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x11c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x98d1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8332}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x769}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xee}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4041}, 0x200080d0) 03:42:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) 03:42:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) [ 2081.275471] audit: type=1400 audit(2000000577.269:75072): avc: denied { map } for pid=9977 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(r1, 0x40b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) socket$inet(0x2, 0x3, 0x7) [ 2081.470126] audit: type=1400 audit(2000000577.319:75073): avc: denied { map } for pid=9979 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:58 executing program 4: clone(0x200bfa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 2081.617210] audit: type=1400 audit(2000000577.259:75070): avc: denied { create } for pid=9980 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) socket$inet(0x2, 0x800, 0x6b) [ 2081.748029] audit: type=1400 audit(2000000577.329:75074): avc: denied { write } for pid=9980 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:58 executing program 0: socket$inet6(0xa, 0x80a, 0x8) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000001c0)={0x9, 0x7, 0x8, 0x9, 0x8, 0xfff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r2, r3) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac141411040490780000000045efffffff00000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000002c0)={0x7, 0xe9}) 03:42:58 executing program 1: r0 = epoll_create1(0x80000) flock(r0, 0x1) socket$inet(0x2, 0x10000000000000b, 0x9) [ 2081.921190] audit: type=1400 audit(2000000577.339:75075): avc: denied { read } for pid=9980 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2082.104633] audit: type=1400 audit(2000000577.369:75076): avc: denied { create } for pid=9980 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2082.148646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2082.165562] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x3, 0x70, 0x80000000, 0x1, 0x9, 0x3f, 0x0, 0x6, 0x1, 0x0, 0x40, 0x3, 0xfffffffffffffff9, 0x0, 0x100000001, 0x101, 0x101, 0xf2, 0x800, 0x10000, 0x800, 0x7, 0x800, 0x4, 0x0, 0x7fffffff, 0x6, 0x401, 0x20, 0x4, 0x7, 0x8, 0x7f, 0x7, 0x2dca, 0x6, 0x1, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x80000000, 0xc6}, 0x4000, 0x22f, 0x5, 0xd, 0xfffffffffffffffa, 0x8}) fcntl$setstatus(r0, 0x4, 0x2800) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) 03:42:58 executing program 4: syz_execute_func(&(0x7f0000000180)="420f8fec5fbdf54a2ae92c981c480f05bf02000003c4a37bf0c55d41e2e93644ffd3c4c16d608590a00000660f383a9e02000000110f4e5b7f4b4b26660f38091ee509c421045f4607c421dd589fc4e10bf8c4c402318c13660fb8a9dddd0ac4c4a3bd4877f88a4c8339c2400fa17272470f38219f0cc39997d0c4efa1a12ad764d3cf53affcfc66450f65ed6766f2aba8b7e7440fecf23f0fecf23f0f79cec462b1f72ec39494e2899294d800000000d093cb0b00f3400fe65b03414e53d2c4816016f7a80db8d4d4668aac0fc465000000eb66440f38314ea18f89709b6500cda2e3e32c757526802d08000000fae549c4dfe046d9e9f30f5ea5a9a50000ffffbedcce8389410bc3110f6444f6aa48850000") 03:42:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000100)={@initdev, @multicast2, 0x0}, &(0x7f0000000140)=0xc) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in=@local, 0x4e23, 0x1, 0x4e20, 0x400, 0x2, 0xa0, 0xa0, 0xdf, r1, r2}, {0x99d, 0x6, 0x1, 0x5, 0x8, 0x10000, 0x7, 0x4}, {0x7079, 0x9, 0x4, 0x1}, 0x8, 0x6e6bbf, 0x2, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d2, 0x3f}, 0x2, @in=@empty, 0x3506, 0x7, 0x2, 0x3, 0x3, 0x4be, 0x2}}, 0xe8) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x100, 0x9, 0x80000001}, 0xc) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:42:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @multicast2}, &(0x7f0000000700)=0xc) 03:42:59 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x8) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:42:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x9, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES64=0x0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64=r0], @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES32=r0], 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f000001e00000010000000005000000ffffffffe0000009ac1e0001ac1e000100000000279bf4f9834f4d8cd6f53bb52ca91e03cdf31ae833103f781d494dfbda6bc5b7427476b767db21597c3492401083f230256f687dc30f827383fe0378423e32fa7171da141d7a17634f26d68806436140c7c303562773f76b3823191cb1a126c140a60d9b3e8442effaef848f5577c3bd7042432da137753e4de2b73d159a73652e73b2fb1b6123d060bdf441406b003f4669abf727a8381b988e2cf0c869586bccbe01981cd8da5710"], 0x24) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000200)=0x0) gettid() rt_sigqueueinfo(r4, 0x3, &(0x7f0000000240)={0x3d, 0x2, 0x7}) r5 = fcntl$getown(r1, 0x9) write$cgroup_pid(r3, &(0x7f0000000180)=r5, 0x12) 03:42:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWALK(r2, &(0x7f0000000080)={0x9, 0x6f, 0x1}, 0x9) fcntl$setstatus(r0, 0x4, 0x2800) 03:42:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='s-aps_rollup\x00yM\xacF\xa83\xfd\xabt\xaa?E\x1b\x00\x95\xfb\xf7\x1c\xb6N;\xcdS\xa0\b\n\xe2^bd\xe0\xf2u\x0e)\x11D\xfc\xb8\xd4\x82x?\x05+L\xe8X\xf8\xe5-\x9c\xd7\xdda/\x049L7\xe0\xd6\x1f/\xba%&6EL\xf0\n\vL\xf1\x02\x01\xc6\x01\x00\x00\x00\x00\x00\x00\x007\xfb\x94!\xa3b\xb9\xd1\"\xdcn\xc8l\xef\x18\x9a};\xf4\xaaK\xb7\xd9\xbb\x9e\f\xa4\xef\n\xbd\x9e\xb7\xc5\xc0?\xa6j\x0fX0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000000)=0x75f895ef1d26299e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', r1}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet_int(r2, 0x0, 0x15, &(0x7f0000000040)=0x7, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0900450000700000000000019078ac2b14bbac1414110404907800000000450000000000000000010000ac2314aaac14140008401255d2204163f6e5fcb500000000000000000000e000000200000000e00000685d9e6647870100000000000000007f00002000000000ffffffff00000000e00000010000"], 0x0) 03:43:00 executing program 3: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r1, 0x4, 0x2804) ioctl(r1, 0x1000, &(0x7f00000000c0)="54704e3f13") 03:43:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="5b97cab46f3d9d7a8a6a1cadaea808bc0c9754a1320f03bb1c6804e53ecdca8e2487605fedb992ab77ff8fe196d35f5f61d8d91655ecde6c8a829bd727c1f6f9dcdd9b710d8d8b920a40d2e64ed795973ac2a86da9bed0ced7251bbf1d9c3542ebd9c5bb08e57b", 0xfffffe12}, {&(0x7f0000000180)="fe10f780f1568a5fa428f115968435cbb013aafea329d4762c8510bef352655818190aedae397c9c159ddff789e4b604c0acabfe112457455088161054d9171bd0d9521d6a855d6cf314361e44b818177184bdc2d2531959b26dcdc9d27b34228948428626888bc2041ba8b5f0d20a390509bd04a799a7e314e8d05230c58820a5c4561975ee71b9e77230da4c9bb0bdf57749e290b84db1b3061a6d78275e76a4a2474938a04296d468b8182b88e5592b7bc69c61a95e28076d385a975c356a154b8d71ca7603cec7a67aed4f8da294b5dd1c642600686bbb", 0xd9}, {&(0x7f0000000280)="ccd0e298abad5d5179ca7b551ca19d5975e48bef6e6f1509fcbccd7f0e9878b50ac1d1d9eb9023c284ecea5397fdb69d061e30c0aa30ec77495d46a2f92263e5c0e23c0f864e1f4fedade7722ef24550645d62be94798859f7eacd9d02c1f0c20bd84c500456dfcc65905bb8ba671c3e5475b44dd27ba620ef1c201e40376151b19cfb383b2e0478dfb1330cebf6a5b9c290920adad4d5196487b78ffb5052888b0f50ab22642c98019885931f1c6e495b0f70a963594184fc", 0xb9}, {&(0x7f0000001640)="467e3de916406035ff67fe0958d02b532bfb0004a889f282fcfcec6ae70af16e422c0d917eb1381489d89f3aac4832bd65c734c0526b18cf80f7b0f1f0da7168c151cc52365123f59d6c308159c0ba05614bbeb98536fac2390dd7f3b9d56246098bde3ad400", 0x66}, {&(0x7f0000000340)="1c181ec50853212140a87b71272ad6be295ded50a8734ab284b749487e1ebfa141034bd7aa361fb94e0f41524a65d7e7ae101648ca8b82e43b7fd1e36f9e34a5e3511ef031ac750aab7fc190e2fd670f21f2140e506a2173c24d970b5b4fb25dcafc9777797cc546314df8d6e767ac4ce52ca8a2b3286092fcb5990b28e8aa24e4c18352e124cc2ddb48db6d42141057ce623dbd59ded51b352cc32272", 0x9d}, {&(0x7f0000000400)="b677ab0a59341d7b7d9d81a22e57d1b9bc2ad15c712addc1f8c5d37fdcab7bca3e8212f273cdf689eae1fd6389eb3d1d46dc47d4542c47a536196586da8bbd94d71026df619459dbf12b18eee60e196de64fc03aa6726e0c7bb837e0e4ad9f6580571094fb6c36aec1a409c2b959792363b979c723315a8f599b3fd8a6913f214c9b", 0x82}, {&(0x7f00000004c0)="773af12d7206d7ea13d49dbea5294c3f15f2573108db1234e3108544ff89e0c41fa7238194f5b56f5f0ca4baec4ddabeb1bb0e83618a8262bbe9f732e37601f8a3011f2a5f54b63c1bf9e2494145f5bd1c75e8", 0x53}, {&(0x7f0000000540)="da12f6eefa6b351a568a255753", 0xd}, {&(0x7f0000000580)="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", 0x1000}], 0x9) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x9}, 0xf) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x31) 03:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @loopback}, &(0x7f0000000680)=0xc) 03:43:00 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x0, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 03:43:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3c, 0x0, 0x0) 03:43:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0xfb, &(0x7f0000000040)={@broadcast, @broadcast, [], {@mpls_uc={0x8847, {[{0x1, 0x444c, 0x0, 0x800000000000000}, {0x5, 0x6, 0x1, 0x7fff}, {0x4, 0x7f, 0xc0e8, 0x10000}, {0x6f, 0x8, 0x989, 0x9}], @ipv4={{0xb, 0x4, 0x0, 0x1, 0xdd, 0x64, 0x7, 0xfffffffffffffff9, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x20}, @remote, {[@lsrr={0x83, 0x17, 0x0, [@broadcast, @broadcast, @empty, @broadcast, @multicast2]}]}}, @dccp={{0x4e21, 0x4e22, 0x4, 0x1, 0xff5, 0x0, 0x0, 0xb, 0x9, 'A A', 0x7fffffff, "061bfd"}, "4e746b48240626f10c1021cd1948b6e21c1e37b7ca8596db38b53fdad30c4a687a8943840f1480738c2ba1de28b5e36362e800ccdcef0d2183cec9b12d6bb7f0acdeb8cc741de790fbbb2acc6c1d87971b78438abf4a446d5960b0569137a423a7a44380b355268cdfef304285bfc5d7e9109f5099bb1ecffcc023934b469921404dd80b6a68cbe58326de9e3b23af45f51e2a0f7a4eedb1787faaee6d9ef778be"}}}}}}, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/105, 0x69) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@local}, &(0x7f0000000180)=0xc) 03:43:01 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000080)={0x3b4d}, &(0x7f00000000c0), 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000180)=""/48, 0x30}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/36, 0x24}, {&(0x7f0000000240)=""/120, 0x78}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/133, 0x85}], 0x6, &(0x7f0000001400)=""/131, 0x83}, 0xfc}, {{&(0x7f00000014c0)=@un=@abs, 0x80, &(0x7f0000001680)=[{&(0x7f0000001540)=""/27, 0x1b}, {&(0x7f0000001580)=""/227, 0xe3}], 0x2}, 0xfff}], 0x2, 0x2000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000001800)=0xfffffffffffffbff, 0x4) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000001740)) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='smaps_rollup\x00') splice(r0, &(0x7f0000001780), r0, &(0x7f00000017c0), 0x400, 0xc) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x0) 03:43:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@generic={0x2, 0x80, 0x9}) fcntl$setstatus(r0, 0x4, 0x2800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80000, 0x0) r8 = dup(r0) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x267}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r0}, {0x8, 0x1, r8}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x4) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockname(r4, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000400)=0x80) getsockopt$inet6_mreq(r8, 0x29, 0x15, &(0x7f0000000440)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000004c0)={'veth1_to_bond\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000940)=0x297) sendmsg$TEAM_CMD_NOOP(r8, &(0x7f0000000800)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8006c008}, 0xc, &(0x7f00000007c0)={&(0x7f0000000640)={0x14c, r9, 0x2, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r10}, {0x130, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xf1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x39}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 03:43:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3c, 0x0, 0x0) 03:43:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e0000001000000000000b56ee76fc4418d8bd36e00007f00000100000000ffffffff00000000e00000010000"], 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/101, 0x65}, {&(0x7f00000000c0)=""/242, 0xf2}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f00000002c0)=""/95, 0x5f}, {&(0x7f0000000340)=""/118, 0x76}, {&(0x7f00000003c0)=""/211, 0xd3}], 0x6) 03:43:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) mlockall(0x3) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x88, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x89b}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3f}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3f}]}, 0x88}, 0x1, 0x0, 0x0, 0x20008004}, 0x840) 03:43:01 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) pwritev(r0, &(0x7f0000001480)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="2678a5818ca6f4951a79a5a6f50b5651859e99df1e070cd70fefbac1101f19d433ff79bec4258cd6304541f578d0cfb638db82d293aa539eb6332c67d05341dbd900511c794900040cb0bf66de9ba40e324a3ff0313439287b542afe4b3cc8fca5b35019548f89a654aac95304a442f43f131fda9cb3002f3614cc4bbaff85fec87b58b8a22db8ecc6af363ada3c175e2eced69c378823c5a3317b795798e7a14aa9764a0aba615a76fb9113184964b2f3dd4e8b710fe52ef36d933a424e33a0799d5dfdf3f21b49750e481a61e26b090fb6d13d53021aa7", 0xd8}, {&(0x7f0000001380)="de6f60722d381e67d17abc5a972be23258aa964abac6693e27af87aebc569ca2aba6a49ad005c6be2891ad960c8ee2a7e80b4a1a9464eb9177f91b28184d071acfaf7c419190de2bec6c3697062bce9471290d21d9a5e30df46e6d206383dc4b34402bf119887da85e980f4bea63d98026e90434816a1248d2c6d107c4442fee400b93b5", 0x84}, {&(0x7f0000001440)="6017155bdd3d88c257633f23", 0xc}], 0x4, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote, 0x4e20, 0x8, 0x4e23, 0x101, 0x0, 0x20, 0x20, 0x11, r1, r2}, {0x6, 0x2, 0x81, 0x200, 0x80, 0x7fff, 0x8, 0x5}, {0x8, 0x4, 0x5, 0x100000000}, 0xff, 0x6e6bb8, 0x0, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x23}, 0x4d3, 0x3f}, 0x2, @in=@multicast1, 0x3505, 0x0, 0x3, 0xa2, 0x3ff, 0x200, 0x100}}, 0xe8) 03:43:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00'}) 03:43:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x81ffe, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3c, 0x0, 0x0) [ 2085.865902] kauditd_printk_skb: 366 callbacks suppressed [ 2085.865911] audit: type=1400 audit(2000000582.279:75418): avc: denied { map } for pid=10112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.086668] audit: type=1400 audit(2000000582.279:75419): avc: denied { map } for pid=10112 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.226601] audit: type=1400 audit(2000000582.639:75420): avc: denied { map } for pid=10127 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:02 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000040)) [ 2086.364316] audit: type=1400 audit(2000000582.649:75421): avc: denied { map } for pid=10127 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDMKTONE(r0, 0x4b30, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3c, 0x0, 0x0) [ 2086.501293] audit: type=1400 audit(2000000582.669:75422): avc: denied { map } for pid=10127 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.661152] audit: type=1400 audit(2000000582.679:75423): avc: denied { map } for pid=10127 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2086.811682] audit: type=1400 audit(2000000582.689:75424): avc: denied { create } for pid=10122 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2086.985979] audit: type=1400 audit(2000000582.689:75425): avc: denied { write } for pid=10122 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x10a, &(0x7f00000002c0)={@broadcast, @broadcast, [{[{0x9100, 0x3, 0x80000000000008, 0x4}], {0x8100, 0x7ff, 0x46, 0x3}}], {@mpls_uc={0x8847, {[{0x6, 0x9, 0x1, 0x2}, {0x6, 0xbbd0, 0x100000000, 0x8001}, {0x4, 0x2, 0x65e9, 0x1ff}, {0x8, 0x1, 0x100000000, 0x4}, {0x1, 0xcd5, 0x1, 0x18}], @ipv6={0x3498, 0x6, "8021dd", 0xb8, 0x87, 0x7, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@dstopts={0x3a, 0x7, [], [@enc_lim={0x4, 0x1, 0x10001}, @jumbo={0xc2, 0x4, 0x1}, @hao={0xc9, 0x10, @ipv4={[], [], @rand_addr=0x8}}, @jumbo={0xc2, 0x4, 0xcdb}, @enc_lim={0x4, 0x1, 0x7f}, @enc_lim, @calipso={0x7, 0x10, {0x2, 0x2, 0x7, 0x8, [0x8f60]}}, @enc_lim={0x4, 0x1, 0x9}, @pad1]}, @hopopts={0xc, 0x0, [], [@enc_lim={0x4, 0x1, 0x1}]}, @routing={0x3b, 0x4, 0x3, 0x6, 0x0, [@mcast2, @remote]}, @routing={0x3d, 0x2, 0x0, 0x36d6, 0x0, [@rand_addr="cda1b4dcc3e8f451744efec2d195a83d"]}, @fragment={0x0, 0x0, 0x200, 0x7ff, 0x0, 0x100, 0x64}], @icmpv6=@mld={0x83, 0x0, 0x0, 0x7, 0x8, @rand_addr="ea8bbf7beb087102c628d71a5f954f7f"}}}}}}}, 0x0) 03:43:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) 03:43:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) [ 2087.153821] audit: type=1400 audit(2000000582.729:75426): avc: denied { map } for pid=10127 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:03 executing program 1: r0 = socket$inet(0x2, 0x1, 0xf9c) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) [ 2087.252544] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:04 executing program 2: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000180)=""/4096, 0x1000}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000012c0)={0xffffffffffffff9c, 0x10, &(0x7f0000001280)={&(0x7f0000001200)=""/121, 0x79, 0x0}}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) close(r1) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001380)=r0, 0x2) getpeername(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) ioctl$FICLONE(r2, 0x40049409, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r4, 0x0, 0x0) 03:43:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="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") r2 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0xa2) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) fcntl$setstatus(r1, 0x4, 0x27fd) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000300)={0x9, &(0x7f0000000280)=[{0x0, 0xe057, 0x200, 0x7}, {0x2, 0x800, 0x6, 0x7b35}, {0x2bb, 0x2, 0x4, 0x80}, {0x10001, 0x2, 0x530, 0x3}, {0x2, 0x400, 0x7, 0x1d}, {0x101, 0x1, 0x9, 0x5}, {0x6, 0x3ff, 0x2, 0x4}, {0x2, 0x400}, {0x2, 0x0, 0xffffffffffff8000}]}) 03:43:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 03:43:04 executing program 1: r0 = socket$inet(0x2, 0x400000000002, 0x60) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @initdev, @remote}, &(0x7f0000000140)=0xc) bind(r0, &(0x7f0000000180)=@xdp={0x2c, 0x4, r1, 0xb}, 0x80) getsockopt$inet_int(r0, 0x0, 0x1d, 0x0, &(0x7f0000000000)=0x9e) 03:43:04 executing program 3: r0 = socket$inet(0x2, 0xa, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000480)={0x0, @aes256}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x50002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x8, 0xc96e, 0xfffffffffffffffc, 0x40, 0x6, 0xac, 0x3, 0xffffffff, 0x8, 0x1, 0x28000000000000, 0x8}) dup(r2) fcntl$setstatus(r1, 0x4, 0x2800) fchmod(r1, 0x40) splice(r1, &(0x7f00000000c0), r2, &(0x7f0000000140), 0x4, 0x8) ioctl$KDSETLED(r1, 0x4b32, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000180)='security.SMACK64EXEC\x00', &(0x7f00000001c0)='\x00', 0x1, 0x0) 03:43:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 03:43:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') 03:43:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfff) read(r0, 0x0, 0x0) 03:43:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f0000000080)="b072354f6593a2aaec6dcc525f406d3c0b7f76889efffc264cae05f5fa005a9da729ffcc40b643c75c43c7940f88e16838b2e77e4a59d88591218af350220d95b9ad51997f056ef4c56fa5ccad2456d254e65dd6dcf14627b6152ac0dd367c9b2351491bc7dae223c2f435f0376c64dddd4d0d1e7cee8d94406decc23f0b4bfe937957dcc1388f8c4da5041cbc2f78bd388c631860b9a88dab0bb70e2006456dc274b616a2cedaed412d95023d3e2746d864ed5421a603edfb242d7f45", &(0x7f0000000140)=""/82}, 0x18) 03:43:05 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=0x109) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = socket$inet(0x2, 0x7, 0x0) write$P9_RRENAME(r1, &(0x7f00000000c0)={0xfffffffffffffe38, 0x15, 0x2}, 0x5) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0xa0, 0x2, 0x8}, 0xfff}}, 0x18) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x515800, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r3, 0x0, 0x12, 0x0, &(0x7f0000000100)) prctl$PR_SET_UNALIGN(0x6, 0x1) 03:43:05 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000140)=0x80, 0x800) sendto(r0, &(0x7f0000000080)="4235e821876f46baf6fb79c48219b820fceb1aefdaf80ce248", 0x19, 0x4004000, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x1, 0x3, {0xa, 0x4e20, 0x2, @loopback, 0x401}}}, 0x80) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r2, 0x4, 0x2800) 03:43:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) 03:43:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x52d) 03:43:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) ioctl$FICLONE(r0, 0x40049409, r0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0700020000001f5f080108000100020273730beeffff005867855e7fa5", 0x2f}], 0x1}, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f000001c96b000000000000000001000000e000000100000000ac14140000000000"], 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='yam0\x00', 0x10) 03:43:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x677, 0x9}) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) 03:43:06 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) 03:43:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0xffffffffffffffc9, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:43:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x402000, 0x0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x20) r2 = socket$unix(0x1, 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000), 0x9) r3 = socket$inet(0x2, 0x100000000000003, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000040)={{0x432, @empty, 0x4e23, 0x0, 'ovf\x00', 0x2, 0x100000000, 0x27}, {@loopback, 0x4e24, 0x10006, 0xeb, 0x7c4, 0x9}}, 0x2f) getsockopt$inet_int(r3, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:06 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) 03:43:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) renameat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:43:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) dup3(r0, 0xffffffffffffffff, 0x80000) 03:43:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0xf2, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[], 0x1d}, [], {@llc={0x4, {@snap={0x0, 0xab, "87", "685888", 0x8884, "817a074b0daab57d82d5c0b195c79611794aeb9a94002543f05b378596044b56d255b36c10eae41263c48182da7f1b5637b2b9395fb16d00441fb0bdbd760f51b3b707599717606b0bbe9dcf1869fb21fadfe03bd4f3dfc58680309372e422c87c7a27164d80f2f199b6ee3dcc1feb359c7b7f37c0b1e187c03d82b83e9f82d07bb99470a3a42fff8cae900cf4e95a75a887098c14b756467f4e9dd094bc7334d4d7411caa1613e0421b1bcebfee62a2637b48db125a135559153b1bdbb8a8afc0d36dcaebf76a3cd974f3ac5ea742aae6b160c66d07383829e0b99f"}}}}}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e0009722c587d32c9a1b140000000000"], 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) 03:43:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000000)="3f6827fef5095c5030bf64940b6cc7e505dc893eb4f005e512c998fc77dd"}, 0x10) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x10001, 0x6400000, 0x1, 0x5, 0x4}) r1 = gettid() r2 = getpgrp(r1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x6, 0x2, 0x7ff, 0x1bd5800, 0x0, 0x9, 0x10100, 0x2, 0x7f, 0x3, 0x1340, 0x0, 0xfffffffeffffffff, 0x1, 0x100000000, 0xffffffffffffff2c, 0x8, 0x81, 0x8, 0xd2c, 0x4, 0x800, 0x6, 0x5, 0x8a67, 0x4, 0x5, 0x1, 0x7, 0x2, 0xff, 0x6, 0x7, 0xfc, 0x7, 0x62ec, 0x0, 0x40, 0xa8a970116bcd5e5, @perf_bp={&(0x7f00000000c0), 0x2}, 0x1000, 0x5, 0x3, 0x5, 0xfffffffffffffff7, 0x400, 0x58}, r2, 0xb, r0, 0x0) read(r0, 0x0, 0x0) 03:43:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) dup3(r0, 0xffffffffffffffff, 0x80000) [ 2090.871859] kauditd_printk_skb: 287 callbacks suppressed [ 2090.871869] audit: type=1400 audit(2000000587.279:75699): avc: denied { map } for pid=10256 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x2800) [ 2091.012553] audit: type=1400 audit(2000000587.309:75701): avc: denied { map } for pid=10261 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2091.175276] audit: type=1400 audit(2000000587.329:75702): avc: denied { map } for pid=10261 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2091.300357] audit: type=1400 audit(2000000587.339:75703): avc: denied { map } for pid=10256 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0802000000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) [ 2091.470338] audit: type=1400 audit(2000000587.349:75704): avc: denied { map } for pid=10256 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:07 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) [ 2091.599725] audit: type=1400 audit(2000000587.359:75705): avc: denied { map } for pid=10261 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:08 executing program 1: r0 = socket$inet(0x2, 0x100000000000000, 0x4) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000080)=0xfffffffffffffda5) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'mime_typewlan0proc'}, {0x20, 'ppp1'}, {0x20, 'mime_typeem1vboxnet1'}, {0x20, 'mime_type)\\#vmnet0[$cpusetcpuset+:'}, {0x20, '\xe7'}], 0xa, "00e83a7ee4162cb9c0ce62c0aa1777437c2cab7c906ed53170cfeee77dc32a4aecd906e68d446b5ce46a328fc17b6ea2c66eb22c48498930b332c12bf5beba019d0392d25e14d8505e64f1b8365fdf319859d3dbb3c2be48cbf128d95f7df2e313a602d90ab5c663222631922410e7826bed9866399a760de207feaefecae74d56f0eb8a917273"}, 0xe4) 03:43:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) fcntl$setstatus(r0, 0x4, 0x2800) dup3(r0, 0xffffffffffffffff, 0x80000) 03:43:08 executing program 2: gettid() openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000100)='smapse0\xcc audit_backlog_limit=64 [ 2091.905151] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2091.952488] audit: audit_backlog=66 > audit_backlog_limit=64 03:43:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = creat(&(0x7f0000000040)='\x00', 0x88) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r2, 0x10, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x1) 03:43:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") ioctl$void(r1, 0x5451) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) 03:43:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) read(r0, 0x0, 0x0) 03:43:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x0, [], [{0x7fffffff, 0x40, 0xcd8, 0x4380d738, 0xff, 0x8001}, {0x3ff, 0x1, 0x86, 0xfffffffffffffffe, 0x5, 0x100}], [[], [], [], [], [], [], [], []]}) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c2000000ffffffffffff0800450000700000000000019078ac2314bbac1414110404907800100000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:43:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x9, 0x3, 0x74f, 0x400, 0xfff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0xfffffffffffffffc) 03:43:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="24bed1f748b7411c4ad45870d670010000000000000066a662735b144bb77d50953fbbb5ff962c48bb2382480000006320d7982a2d9688e7b353b5446cd40069e2b6932d54113c0e7b8a02ce8a48cc") r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r2, 0x80000) 03:43:09 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3c, 0x0, 0x0) 03:43:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:09 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x81) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000040)=[{}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) r1 = socket$inet(0x2, 0x800000000007, 0x40000060) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)="43b7834d7552eb2beeb6f7d1b033c231d63df8fed4003d9ac6ae1258c45deb1d9813cbedf456b14f99e190d762d5f14c63dd54da6b61e8d35831e43d44104b0f129a94d8e9b5a03a98a127c3c2cee448c495599fae8cf486de44d69d9d250d3f06159fe2b047a9873e958c89ca3c10e8f023e868e9df3063", 0x78, r0}, 0x68) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000000080)=""/4, 0x4}, {&(0x7f00000000c0)=""/74, 0x4a}, {&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/185, 0xb9}], 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:10 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:43:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0x5, 0xfffffffffffffc85) syz_emit_ethernet(0xa0, &(0x7f0000000140)={@link_local, @remote, [], {@llc={0x4, {@snap={0xab, 0xab, "035c", "e1a06a", 0x15, "30f6bddca2ff1c331624b85194d252ed235057930759b7f4a5738b9864dbe3e474a7f4a7c39e5f7843701ba93b78103077a434439da65ad799d0116b3b275d929078ff1a290fbe63d194a04ac31f35942a3d72363a9ed751c694d5108a2a4e336542fac6247348a93fb261a3550c56bef6b1cd32647f27c013c4ca00f6ed2d3bc0f03e61a5ea0d235f"}}}}}, 0x0) 03:43:10 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) 03:43:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x81, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x2800) 03:43:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='smaps_rollup\x00') read(r0, 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) 03:43:10 executing program 4: socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 03:43:11 executing program 0: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2facb2c4) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)=0x42) r1 = socket$inet6(0xa, 0xe, 0x1d2) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip_vti0\x00', 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000080)={@dev, @multicast2, @multicast2}, &(0x7f00000000c0)=0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r4, 0x200, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4004800}, 0x4004000) setsockopt$inet_int(r2, 0x0, 0x9, &(0x7f0000000100)=0x7, 0xfffffffffffffded) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x1, 0x2, 0x6, 0x3}, {0x9, 0x3, 0x5, 0x5}, {0x7, 0x3, 0x8}, {0x8, 0x2, 0x6, 0x2}, {0x9, 0x1, 0x707, 0xd6}, {0x85, 0x6, 0x7f, 0x9}]}) syz_emit_ethernet(0x7e, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffff5bffff0800440000700000000000019078ac2314bbac1414110404907800000000450000080000000000010000ac2314aaac141400084000000000000000000000e0000002000000008b9432e000000100000000000000007f0000010100000000ac14140000000000000000000000000000000000000000ceebb256d6d563024b793ec6181ea2ba02b2b75de9d5d948220d5481dfa30d5c7093ab069fc83c0123b1cbc8eb"], 0x0) 03:43:11 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000200)=""/145, 0x91, 0x0, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) shutdown(r0, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='bcsh0\x00', 0x74b9, 0x1b16, 0x9c0d}) 03:43:11 executing program 4: socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 03:43:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) 03:43:11 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x27fd) 03:43:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = getpgid(0x0) fcntl$setown(r0, 0x8, r1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @multicast1}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r2, 0x0, 0x118) write$P9_RFSYNC(r5, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000280)) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f00000001c0)={0x8001, 0x3c3, 0x1, 0x8, 0x2, [{0x5, 0x1, 0x40400000000, 0x0, 0x0, 0x100}, {0xfd3, 0x8, 0x8, 0x0, 0x0, 0x200}]}) 03:43:11 executing program 4: socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x3c, 0x0, 0x0) 03:43:11 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) fcntl$setpipe(r0, 0x407, 0x7fffffff) 03:43:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) 03:43:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x109702, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'gre0\x00', 0x4}, 0x18) epoll_pwait(r1, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x1fd, 0x0, &(0x7f0000000100)={0x7f}, 0x8) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) 03:43:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_capability(r1, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x20, 0xffffffffffffff80}, {0x3, 0x5}]}, 0x14, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:43:12 executing program 2: socketpair(0x3, 0x80001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000500)=@nat={'nat\x00', 0x19, 0x2, 0x380, [0x20000180, 0x0, 0x0, 0x200001b0, 0x200004d0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x12, 0xf6, 'bond_slave_0\x00', 'veth0_to_hsr\x00', 'bridge_slave_1\x00', 'gre0\x00', @random="945ebcbadcc9", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x128, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@empty, [0xffffff00, 0xffffffff, 0xff, 0xffffffff], 0x4e21, 0x3a, 0x6, 0x4e20, 0x1a, 0x20}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0x10}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}, {{{0x5, 0x0, 0x8917, 'veth0_to_bridge\x00', 'gre0\x00', 'nr0\x00', 'nr0\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0xff, 0xff], 0x128, 0x190, 0x1c8, [@connbytes={'connbytes\x00', 0x18, {{0x9f86, 0x2bcb, 0x1}}}, @ip6={'ip6\x00', 0x50, {{@loopback, @remote, [0x0, 0x0, 0xffffffff, 0xffffffff], [0xffffff00, 0xff0000ff, 0xffffff00, 0xff000000], 0x401, 0x3b, 0x0, 0x2, 0x4e22, 0x4e22, 0x4e24, 0x4e24}}}]}, [@snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xffffffffffffffff}}}, @common=@AUDIT={'AUDIT\x00', 0x8}]}, @arpreply={'arpreply\x00', 0x10, {{@random="577978a9b125", 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x3f8) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'yam0\x00', @ifru_ivalue=0x2}}) read(r1, 0x0, 0x0) [ 2095.891505] kauditd_printk_skb: 314 callbacks suppressed [ 2095.891515] audit: type=1400 audit(2000000592.309:75994): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2096.051133] audit: type=1400 audit(2000000592.309:75995): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @local}}}, 0x108) 03:43:12 executing program 2: getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/tcp\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000000)=""/139) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', r2}) [ 2096.269137] audit: type=1400 audit(2000000592.309:75996): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:12 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x10000, 0x0, [0x8ef4, 0x6, 0x5, 0x8, 0x6], 0x3}) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) 03:43:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) [ 2096.382560] audit: type=1400 audit(2000000592.339:75997): avc: denied { map } for pid=10398 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0xfffffffffffffffe}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x4, 0x4) fcntl$setstatus(r0, 0x4, 0x2800) [ 2096.550099] audit: type=1400 audit(2000000592.369:75998): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2096.688833] audit: type=1400 audit(2000000592.369:75999): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2096.868717] audit: type=1400 audit(2000000592.389:76000): avc: denied { map } for pid=10398 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) [ 2096.988262] audit: type=1400 audit(2000000592.389:76001): avc: denied { map } for pid=10398 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:43:13 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x9) [ 2097.189573] audit: type=1400 audit(2000000592.419:76002): avc: denied { map } for pid=10394 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40080) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2097.390097] audit: type=1400 audit(2000000592.659:76003): avc: denied { map } for pid=10409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000ffff00400000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f0000010000517686580e7e45ca0000ff25c1ff00000000e000000100000000ac14140000000000da1826627abbbdf9d3f2b061f3e203968997ba2104a728"], 0x0) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x40, 0xa55}]}, 0xc, 0x2) fcntl$notify(r0, 0x402, 0x2) 03:43:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x4, 0x8, 0x7fff}, 0xc) read(r0, 0x0, 0x0) 03:43:14 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r3) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r4 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10000, 0x2, 0x2, 0x8001, 0x0, 0x80, 0x40, 0x1, 0x3, 0x2, 0x8, 0x9, 0x80000001, 0x9, 0x3f, 0x5, 0x7, 0xbb6f, 0x5, 0x8, 0x100000000, 0xffffffff, 0xffff0000, 0x8, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x9a, 0x3, 0x800, 0xff, 0x0, 0x534, 0x2, 0x0, 0x83, 0x7, @perf_config_ext={0x4, 0x81}, 0x84, 0x10000, 0x8, 0x2, 0x8000, 0x8000, 0x5}, r5, 0xc, 0xffffffffffffffff, 0xb) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac7f598a073dcef41414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd4, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x84}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x35}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 03:43:14 executing program 3: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x80800) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(r0, 0x406, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r2, 0x4, 0x2800) 03:43:14 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xe467d35b9b968957, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@allocspi={0xf8, 0x16, 0x311, 0x0, 0x0, {{{@in, @in=@broadcast}, {@in6=@local, 0x0, 0x6c}, @in6, {}, {}, {}, 0x70bd25}}}, 0xf8}, 0x8}, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000080)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) read(r3, 0x0, 0x0) 03:43:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:43:15 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000808}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x80, r1, 0x101, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xef}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x567becc30422e445}, 0x48080) r2 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r2, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:15 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) read(r1, 0x0, 0x0) 03:43:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @rand_addr=0x2}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'gretap0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x2800) 03:43:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:15 executing program 1: r0 = socket$inet(0x2, 0x10000000000000a, 0x5f) r1 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000040)=""/187) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x6, 0x4) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) faccessat(r2, &(0x7f0000000300)='./file0\x00', 0x80, 0x200) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/174, 0xae) 03:43:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x9, &(0x7f0000001200)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYBLOB="d5b6c577ecbdf9ae95327a30064833082ecf73720bc8d45e3bbc6f148660f28a2200"/45, @ANYRES64=r0, @ANYRES16=r0, @ANYBLOB="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"], @ANYRESOCT=r0, @ANYPTR=&(0x7f00000011c0)=ANY=[@ANYRES16=r0], @ANYRES32, @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRES64=r0, @ANYRES16=r0], 0x0) 03:43:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:16 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') read(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x3, 0x1}) 03:43:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fchmod(r0, 0x161) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@initdev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) fcntl$setstatus(r1, 0x4, 0x40c00) 03:43:16 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x10000) 03:43:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x4, &(0x7f0000000140)={@remote, @broadcast, [], {@llc_tr={0x11, {@snap={0xab, 0xab, "c5", "6747c5", 0x8809, "943ef4d69715b1a0443c282271ee7f33cb444a625f0871c74e67443e73e8b86b17b05c7b5691762c3746dba667c86924d2fce29cb34d24c825a33f016ec9097af86af9d9ad444b2a80a1c576bf0ac40d2485c01a844804710459d051449cacb44d501fbe0f3c894e301cb62159b783a7a3b4f4eab175b0a3718cf0496b4e79f413cd82a804da1b483a02f492c3"}}}}}, 0x0) 03:43:16 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x108, 0x2080) dup3(r0, r1, 0x80000) 03:43:17 executing program 3: socketpair(0xf, 0x80000, 0x3, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000480)={@dev, 0x0}, &(0x7f00000004c0)=0x14) sendto$packet(r1, &(0x7f0000000400)="3cc0b6b5b362229378ef2b700dd116bd8b25349d92f483715f092ce07610aaef1fdc48fd7302e3f3d3b839740cc96683af64d1c142b187f1310ecd8922028b017778cae2405739ec492f8307be840ecc3a8e428b93107361409f29ea4237b0", 0x5f, 0x24048041, &(0x7f0000000500)={0x11, 0x5, r2, 0x1, 0x3, 0x6, @dev={[], 0x7}}, 0x14) r3 = dup(r0) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000040)={0xab5, 0x20, 0x1}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x298, 0xc0, 0xc0, 0xc0, 0x0, 0x0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, &(0x7f0000000080), {[{{@ip={@multicast2, @rand_addr=0x3, 0xffffff00, 0x0, 'ifb0\x00', 'gre0\x00', {0xff}, {0xff}, 0x33, 0x2, 0x1}, 0x0, 0x98, 0xc0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}, {{@ip={@remote, @multicast2, 0xffffff00, 0xffffffff, 'lo\x00', 'caif0\x00', {0xff}, {}, 0x0, 0x2, 0x35}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x9, [0xfffffffffffffffe, 0x6, 0xe2, 0x0, 0xffff, 0x3], 0x3, 0x80000000}}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x9}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x2, 0x1, 0x200}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r4, 0x4, 0x2800) 03:43:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) syncfs(r0) read(r0, 0x0, 0x0) 03:43:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3621}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008084}, 0x40004) r5 = open$dir(&(0x7f0000000340)='./file0\x00', 0x402, 0xfffffffffff7fffd) write$9p(r4, &(0x7f0000000800)="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", 0x400) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) sendfile(r4, r5, 0x0, 0x10000) keyctl$unlink(0x9, r1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000c00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xfe, 0x7, 0x53d6d601, 0x2, 0x3, 0x3e, 0x5, 0x24a, 0x40, 0x2c62, 0x6, 0x0, 0x38, 0x2, 0x20, 0x65a, 0x3}, [{0x0, 0x81, 0x0, 0x941, 0x5, 0x0, 0x7, 0x9}], "b91d3d9babea360c3d9c717883d3f11fd30296643a7eb2a095a29739413873160dc74a0d488887c6a4b2feccd0b1b5ffe9679e54d44f05414a149cef1528633a4f51b0a45824e59286d74a12843983d946ef4a5bdc4482a678e8f29093e4fb251b2d"}, 0xda) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)=""/169, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x8000}, {0x0, 0x2}]}, 0x18, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='cpuset\x00', r4}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x9) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:17 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0xd0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000040)="388771daaf0a1f7917", 0x9) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:17 executing program 4: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, r1, 0x80000) 03:43:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x0, 0x0) preadv(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x200000c5) prctl$PR_GET_THP_DISABLE(0x2a) r3 = socket$inet6(0xa, 0x0, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000580)={0x18, 0xd, 0x0, {{0x40000000040}}}, 0x18) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = timerfd_create(0x8, 0x800) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[], 0xff4a) openat$cgroup_procs(r5, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, 0x0, 0x381) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x20032600) write$selinux_user(r7, &(0x7f0000000380)={'system_u:object_r:fsadm_exec_t:s0', 0x20, 'staff_u\x00'}, 0x2a) r8 = openat$cgroup_ro(r4, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) chmod(0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000200)={'filter\x00'}, 0x0) lstat(&(0x7f0000000100)='./control\x00', &(0x7f0000000280)) open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0xf6ffffff) connect$unix(r8, &(0x7f00000004c0)=@file={0x1, './control\x00'}, 0x33) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) read(r0, 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) [ 2101.363050] kauditd_printk_skb: 201 callbacks suppressed [ 2101.363059] audit: type=1400 audit(2000000597.779:76205): avc: denied { map } for pid=10547 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:17 executing program 1: r0 = socket$inet(0x2, 0x80807, 0x460) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000001080)='user\x00', &(0x7f00000010c0)={'syz', 0x2}, &(0x7f0000001100)=',(\x00', 0xfffffffffffffff8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000001380)={'ipddp0\x00', 0xb82}) r3 = add_key(&(0x7f0000001140)='cifs.spnego\x00', &(0x7f0000001180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f00000011c0)={r1, r2, r3}, &(0x7f0000001200)=""/217, 0xd9, &(0x7f0000001340)={&(0x7f0000001300)={'sha512-avx\x00'}}) [ 2101.519613] audit: type=1400 audit(2000000597.809:76206): avc: denied { map } for pid=10547 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:18 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, r1, 0x80000) [ 2101.665315] audit: type=1400 audit(2000000597.829:76207): avc: denied { map } for pid=10547 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:18 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fstat(r1, &(0x7f00000000c0)) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2101.830109] audit: type=1400 audit(2000000597.849:76208): avc: denied { map } for pid=10547 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2101.964028] audit: type=1400 audit(2000000597.879:76209): avc: denied { map } for pid=10547 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:18 executing program 1: lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = dup3(r0, r0, 0x80000) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x9, 0x80000000, 0x7f0}, {0xcf28, 0x0, 0x1f, 0x5}, {0x6, 0x3, 0x1f, 0x9}, {0xfffffffffffffffb, 0xffffffffffffff01, 0x79, 0xc21e}]}) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2102.122077] audit: type=1400 audit(2000000597.909:76210): avc: denied { map } for pid=10552 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2102.278161] audit: type=1400 audit(2000000597.929:76211): avc: denied { map } for pid=10547 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:18 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x9}, 0x8) read(r0, 0x0, 0xfffffffffffffe64) 03:43:18 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) [ 2102.494218] audit: type=1400 audit(2000000597.929:76212): avc: denied { map } for pid=10552 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:19 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0xffffffffffffff95) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x10000000044002) 03:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r1, 0x80000) [ 2102.656961] audit: type=1400 audit(2000000597.959:76213): avc: denied { map } for pid=10547 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="a0376448d80b0000000000048137ffff003cffffffffffffffffffff05acd29acbb8a3cbf072e7287cf374119fa00fd67e08aa83e1aea65e82cb25dface4e4defbff7567c0ae5c84832891d907f06aae4e5385ee5c911a1c4207e6ec6415"], &(0x7f00000000c0)={0x1, 0x1, [0xeb, 0x81c, 0x794, 0x2e8]}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) [ 2102.702064] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:19 executing program 1: r0 = socket$inet(0x2, 0x104000000000006, 0x8000000000060) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000000)={0x7, 0x2, 0x1, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x151) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) read(r0, 0x0, 0x0) 03:43:19 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r1, 0x80000) 03:43:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80040, 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xac, r2, 0x10, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd89}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x70}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4694}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6216}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9b}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd79}]}]}, 0xac}, 0x1, 0x0, 0x0, 0xc894}, 0x8040) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b00010200000000004075a25e5400"], 0x10}}, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x400000000000002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaabbffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac1414000840000000000000158e1dffb3db00000000e000000200000000e000000200000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) 03:43:19 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x480080, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101000, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) 03:43:20 executing program 1: r0 = socket$inet(0x2, 0x100000108000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, 0x0) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000011c0), 0x4) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x3, r4}, {0x2, 0x2, r5}, {0x2, 0x4, r8}], {0x4, 0x6}, [{0x8, 0x4, r10}], {}, {0x20, 0x6}}, 0x4c, 0x1) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x9, 0x586, 0xa01}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001000)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001040)=0x0) sendmsg$netlink(r1, &(0x7f0000001140)={&(0x7f0000000580)=@proc={0x10, 0x0, 0x25dfdbfd, 0x4000}, 0xc, &(0x7f0000000f80)=[{&(0x7f00000005c0)={0x428, 0x36, 0x18, 0x70bd2b, 0x25dfdbff, "", [@typed={0x4, 0x48}, @nested={0x23c, 0x83, [@typed={0x4, 0x3a}, @typed={0x4, 0x10}, @generic="7804a3a54ae9f5c1ee27dad803a82f3abc22585658d4de2929376ab294c03f046974933a7eaa2f803b6c39c161fc730d30ad2c690ea6da7486b79d6d1e9d3b90c1c057165b9bc3db609804715e2c5d5e1022929a5877ed4631e7583d4993cad026771482b4ec51bd42f434e695bf9c11443b4077ea1f5fd34353662d4ad089bbe61d5e8d74046ddf7316a438eca9719f0d5b11b140760708d69cbfaae7", @typed={0xc, 0x16, @u64=0x1}, @generic="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", @generic="5547a420cc0290bb6f98a7581be16aedd7992526dd6652662638aeca160951e6ee2b05e1e7be38c9f3eaf219f49092e7fb2423e2a5816a0362863c265714661936100dc0bb91dcd6d1433598d1c21424f6c965c57735a6d827dd13a80bb86ad50c8eacbc4f63a6cd2d02e0a5cda34aa4f953fe3f84204db2a7f55a22729a2c0756b9824e7c6f53e1b6"]}, @nested={0x1d8, 0x7, [@generic="8fae69266fe4f02c69be9f060ad8f51dc69e36668e7ac3e3be72e72972a43de54427942e839b6f1a7707baae87bee1a91319d176813394b39b2bb62bbaca64", @generic="3257d8c4cd9b3d83b7897a7775cdc1163e322b2b79605a3214cbaa805230c75160476be06700ed9f77d70ad4af465495a52b7d3b1f63796f99e753266e1c354eb67c0d2cda9b8d01762989e9de6067545172c6f97c02304454226fa912223f75323c37d35d08be2d7c3b589b317ef457c1e10a6b5cd8e601fc1146b15b2610972ecea76522e8fb1e7c110eb36bc74475c3f55fdfdf655313b7fd98dd26e24119b43c5462edaee385340a1b45467e304b1878684a097dd124d725f51c6a3707ea7aef6a73260dfe96301f8e536ff802de00de135c85e93568278bee45", @typed={0x8, 0x33, @uid=r4}, @generic="a769723d68aa2319c98c20149caef7c3220e6759782eeac7fb1fb637482bf233721c6786201bed805df14be32b7672f69c8c3ca932a3f83bf82eb18cf51b908c20d47a0cdf3ac95f7d96b8f4f7fbfc929072bef638af96f96c9885e5ea60e195bb0fcfe2f6f90e3b319cf11a08e16ea97e8a91f3a507656fb641f85eb343b2e0194e27eb1d38439fbd8b2269daf1da7c5c2dcba7e7b6cf868c8f293a8b5259ead12728a1539d664fbe3dca660b54"]}]}, 0x428}, {&(0x7f0000000a00)={0x26c, 0x39, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x20c, 0x2d, [@typed={0x64, 0x5, @binary="92373d0d3503dc26c9e3c14b339f0bf8cf12bb26e8f419e62ea8b627bb260591a1a03e341a9b0118b57b9767d3bc0211419b51a940d3ee2c8abff00fa07e3b3c264c1cf36779119f7eba3b2ec831dc15068e0fee61897302cbd0ac8fffdeadc6"}, @generic="364e6814632b720fc11ebc1eb7a199b668bfce7164fc0e3a62d53979f49e73a37ebade3ca48c906db9e22aac08c43c10a52b454be3ec013acfbedbd76e20a9a48358e3763fa1cf25d032ded011740d295ec30410e19f88338918aaa0aa2b9a41e5c689c2b0c270d264f2efe906fec321de78c7060775df1d60ca41eb4b3f4190953d8894409d7f09a2e3ab11da3ac3c66a503bc0fd82d3b61a7c844f390fbcb0c5ca60bd1b43c17d58e55b7e57618f4883be9129edbef7b268b0558807164c23cad954bb5e5cf29e16069b8c58a5599dd611407e423269b7ecc9c06be69776a56cee86521f77a23859", @typed={0x4, 0x71}, @typed={0x8, 0x44, @uid=r8}, @generic="c0ec84c7e22ed777d87b17bae92d6544ea1f625a6e6451858b166737e4a264b85e7c9fc599083a219a41ddeda3fd04be5780de4962400c6703d99e62b2690c1c284f1bcc22524c1f177af570b2e8d4731e0c2b0d819e6928baeae4d98aed7fc2fce89540589f22963d7856fc81a7fa1f685d5f886febe923027433d7d5e96cd92b9cfbdedc654822fe3ebb13253443876f129aec0a38ed07794a6a8ae8e8a00cf9ba391071a3eaae8a41278d89c3"]}, @generic="de72eaa791ede1a26e90b8518e119518b86e93536d22a0cefeb39ceaf538dbcc25b091fbfc9f00c674cf4e1fbc1511de3245a2aa5b04a6d3ab167252bbc51d36feca098f449e0ca814ecf97afb"]}, 0x26c}, {&(0x7f0000000c80)={0x38, 0x16, 0x402, 0x70bd2c, 0x25dfdbfd, "", [@typed={0x8, 0x67, @ipv4=@remote}, @nested={0x20, 0x13, [@typed={0x8, 0x3b, @u32=0x401}, @typed={0xc, 0x2c, @u64=0x8}, @typed={0x8, 0x6a, @uid=r6}]}]}, 0x38}, {&(0x7f0000000cc0)={0x38, 0x24, 0x20, 0x70bd27, 0x0, "", [@typed={0x8, 0x16, @uid=r5}, @typed={0x8, 0x22, @fd=r0}, @generic="624ccb7d5b4b29701b2a24a45ae43b0be4d0741404d84f"]}, 0x38}, {&(0x7f0000000d00)={0x264, 0x2f, 0x100, 0x70bd2b, 0x25dfdbff, "", [@nested={0xc, 0x56, [@typed={0x8, 0x0, @uid=r7}]}, @generic="0cc970346932b514381e03927c226b1e8d22cb3a3ed9b772aeb4f432ceb5fe5a113237ea4db914a2bcadfa05734abac21f431cd1f1c062d81bb196d811080c12af22e94cb2240b64dceccc02d9c53dea59363d5bc66b066407dfd477c7379f879eed3d990fc2", @typed={0xc, 0x1f, @u64=0x100000001}, @generic="e2b4f434994700a0e0e84fbf40eb3952865e38fbfb9219ecdde12d0957f88dd06c34e0dc6da85912ff68edab7180d0f24b8bb2d496bd4ba52146705268e38968781fe65b644aca401c36af57e638a8331812bae5b2835da12248ca10867f4a1affecc9c53763d38eb640", @typed={0xc, 0x6c, @u64=0x5}, @generic="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", @generic="defeffa50520a5d5a2de81c637062ae731deac9420ad8291adbcd006c558250691baaf06b68cd19c231144abafff066c89ab0f7011ec8c6ef6c2c4ee668e67245b9905f321c1123b6721101e98b520d9d937c3dfc1a2af283e000a35632d0a6413e8"]}, 0x264}], 0x5, &(0x7f0000001080)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @cred={0x20, 0x1, 0x2, r11, r4, r3}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @cred={0x20, 0x1, 0x2, r12, r2, r9}], 0xa0, 0x80}, 0x4) read(r0, 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000001180)=0x8) 03:43:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r1, 0x80000) 03:43:20 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffff9c, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=""/212, 0xd4, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f0000000000)=""/202, 0xca, r2}}, 0x10) r3 = dup(r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000054000000ebd252af7d01a6c349fff0e37c1b4b068564b1a1de42d062a6c34f599362dcfe866238057d0f1aa61bbbe60905a2080f653899c427c8af4d54b7f6a875cd1f19d0240e4f6cf13c5906fee39a2bea1dc9af00000000000000277d7d"], 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x2604}) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x100003f00}, 0x2c) wait4(r4, &(0x7f0000000340), 0xe, &(0x7f0000000380)) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2c) wait4(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) 03:43:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in6=@mcast2, 0x4e20, 0x0, 0x4e22, 0x1, 0x2, 0x80, 0x80, 0xff, 0x0, r3}, {0x0, 0x6, 0x0, 0x0, 0xeea, 0x400, 0x200, 0x6}, {0x6, 0x5, 0x8, 0x5}, 0x81, 0x0, 0x3, 0x1, 0x1, 0x2}, {{@in=@multicast2, 0x4d4, 0x6c}, 0x2, @in=@loopback, 0x3505, 0x0, 0x3, 0xfffffffffffffff9, 0x9, 0x10000, 0xd7}}, 0xe8) fcntl$setstatus(r0, 0x4, 0x2800) write$P9_RREADDIR(r0, &(0x7f0000000340)={0x49, 0x29, 0x1, {0x0, [{{0x40, 0x2, 0x5}, 0x0, 0x4, 0x7, './file0'}, {{0x40, 0x2, 0x7}, 0xd24f, 0x55b, 0x7, './file0'}]}}, 0x49) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x5) 03:43:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x412, &(0x7f0000000040)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smap\xcb\x00\x00\x00llup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:43:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) 03:43:21 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000000)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x4, 0x4, 0x7ff}) 03:43:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = getpgid(0x0) syz_open_procfs(r2, &(0x7f0000000040)='net/rt_acct\x00') fcntl$setstatus(r0, 0x4, 0x2800) 03:43:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffff0800450000700000000000019078ac2314bbac14141104049078000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f000001001a0000ffffffff00000000e000000100000000ac1414000000000000000000000000e524478c5bda43686b59dacb6f6c9675d9b0d0908478b88fa8d33c2fa9bfb379f32bd5d9f7073709b2fae2e4d412d64ecfdd9947734e75896b001474a4c010f886b16fa67b73d4dd931b359c1d2dea89a029fc7ad2735f0fd1fa35afe8ddcffff418b60fdcf786d115dab33ec11ffc67b7aac7a84f6c68d9080621d756d5fb303faa2faaf06fa5ea3a94c30def709516fc775694ec52fb84622a6ad52471e1942747d6cf5159f2"], 0x0) 03:43:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x100000005, 0xd646c9fc4f42cbae) 03:43:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) 03:43:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0xfffffffffffffe35) tee(r0, r0, 0x8, 0x2) ioctl$TCSBRKP(r0, 0x5425, 0x401) 03:43:22 executing program 1: lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "aa7e63e8f4503dd7704cf44949594c"}, 0x10, 0x3) r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000), 0x2) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) listen(r0, 0x8) 03:43:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x6c) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @multicast1}, {0x1, @broadcast}, 0x20, {0x2, 0x4e23, @multicast1}, 'team_slave_0\x00'}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1420}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r3, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe0c}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xc}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}]}, 0x124}, 0x1, 0x0, 0x0, 0x4001}, 0x4000000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() sendmsg$unix(r2, &(0x7f00000005c0)={&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)="3c72c3cfe5e359cbdb96", 0xa}], 0x1, &(0x7f0000000580)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}], 0x20, 0x4}, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000600), 0x4) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) 03:43:22 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(0xffffffffffffffff, r0, 0x80000) 03:43:22 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ipx\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x0) 03:43:22 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) 03:43:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setflags(r0, 0x2, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac14141104049078000000004500aa000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0xfb, @dev={0xac, 0x14, 0x14, 0x22}, 0x4e21, 0x0, 'nq\x00', 0x20, 0x18, 0x28}, 0x2c) [ 2106.373704] kauditd_printk_skb: 248 callbacks suppressed [ 2106.373714] audit: type=1400 audit(2000000602.789:76433): avc: denied { map } for pid=10686 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="a0376448d80b0000000000048137ffff003cffffffffffffffffffff05acd29acbb8a3cbf072e7287cf374119fa00fd67e08aa83e1aea65e82cb25dface4e4defbff7567c0ae5c84832891d907f06aae4e5385ee5c911a1c4207e6ec6415"], &(0x7f00000000c0)={0x1, 0x1, [0xeb, 0x81c, 0x794, 0x2e8]}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) [ 2106.570097] audit: type=1400 audit(2000000602.869:76434): avc: denied { map } for pid=10686 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, 0xffffffffffffffff, 0x80000) [ 2106.722737] audit: type=1400 audit(2000000602.889:76435): avc: denied { map } for pid=10686 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') write(r0, &(0x7f0000000040)="6d64035d9340d159", 0x8) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x1) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) 03:43:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000001880)=0xe8) syz_mount_image$msdos(&(0x7f0000000380)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x2, 0x6, &(0x7f00000016c0)=[{&(0x7f0000000400)="9b20b61bf7393da2edd9c2a88667954594b3c9cf4b091ee0f476961131603ccefb23194351d09a11fe9ab0ca28eadabc20e96d30f465d89cad05062bdbb9fafa35dad3c99c6eb52014067c21998047d5d7bb43c2654f61823ff212011ba5723134317cc6e83dadfceaac99e71a320c1c96f67bf6c3e1932294c079e8df35723bf80033aa558baa75c8e2872a05a0828a", 0x90, 0x5}, {&(0x7f00000004c0)="b53147e908be06ed66be714e4c320073d544daa65b1884fe70d5858c905558771e7eb30ea1f73f2c21ad3de68f0ab20734a16dee94a1512bbd5c7f2397a4a5723f34beb9b461c2ae6540b9ca2a2a3dbaeb4f5dc5be24563b46c1b6ec5f33bc5cfed743621d66f9fb80adde1a7b4a265955a8452a7d3031537865efbd9282cbd003fb102a63da7868733cf1fb401f21f8e26d4d", 0x93, 0x100}, {&(0x7f0000000580)="da96dd577a08f5984e17b4f3584373228b2dbbe86fd9f01a", 0x18, 0x2}, {&(0x7f00000005c0)="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", 0x1000, 0x8}, {&(0x7f00000015c0)="200b693621fb20a181d030d528ec13e2287968979617780885e97e0066c5b080d303c3727fdd348ef434561500246cc09be376000dfc3ddf70e745af34d6df4e8dadd5d1d76cc67af3", 0x49, 0x7}, {&(0x7f0000001640)="f55d1a9663a3a6eea7f5e35a28217b45a0952cd96575f2ab039909d207d85e7a5e42188353e4a9d0cf02bec661b04e72357acd24e7a71abc448838ad2564ffee2aaa4a50b075341f0f5072b73179c0e76b8ebbac4de089798c8fb46b535673e41b4077db7695c97a28c205d7bd8dc985ad", 0x71, 0x2}], 0x189014, &(0x7f00000018c0)={[{@fat=@errors_remount='errors=remount-ro'}, {@dots='dots'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fsmagic={'fsmagic', 0x3d, 0xe5}}, {@measure='measure'}]}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x8) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000300)={0x7d, 0x7d, 0x2, {{0x0, 0x5e, 0x85, 0x7fff, {0x40, 0x0, 0x8}, 0x24000000, 0x2, 0x7, 0x1, 0x1, '*', 0x16, '$GPL@md5sum,ppp0cgroup', 0xa, '/dev/ptmx\x00', 0xa, '/dev/ptmx\x00'}, 0xa, '/dev/ptmx\x00', r3, r4, r5}}, 0x7d) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x4002) [ 2106.867696] audit: type=1400 audit(2000000602.949:76436): avc: denied { map } for pid=10686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x404500, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000002c0)={0xffffffffffff0000, 0x7, 0x80, 0x20, 0x8, 0x3, 0x3ff, 0x7, 0x9, 0x1, 0x80, 0xd014, 0x81, 0x58, &(0x7f00000001c0)=""/225, 0x4, 0x6, 0x9}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x5, 0x0, &(0x7f0000000100)=0xe2b96f3892dbf60c) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=""/56, 0x17) [ 2107.042869] audit: type=1400 audit(2000000602.949:76437): avc: denied { map } for pid=10686 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@broadcast, @remote, @initdev}, &(0x7f0000000080)=0xc) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0], 0x0) [ 2107.236039] audit: type=1400 audit(2000000603.029:76438): avc: denied { map } for pid=10696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3621}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008084}, 0x40004) r5 = open$dir(&(0x7f0000000340)='./file0\x00', 0x402, 0xfffffffffff7fffd) write$9p(r4, &(0x7f0000000800)="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", 0x400) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) sendfile(r4, r5, 0x0, 0x10000) keyctl$unlink(0x9, r1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000c00)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xfe, 0x7, 0x53d6d601, 0x2, 0x3, 0x3e, 0x5, 0x24a, 0x40, 0x2c62, 0x6, 0x0, 0x38, 0x2, 0x20, 0x65a, 0x3}, [{0x0, 0x81, 0x0, 0x941, 0x5, 0x0, 0x7, 0x9}], "b91d3d9babea360c3d9c717883d3f11fd30296643a7eb2a095a29739413873160dc74a0d488887c6a4b2feccd0b1b5ffe9679e54d44f05414a149cef1528633a4f51b0a45824e59286d74a12843983d946ef4a5bdc4482a678e8f29093e4fb251b2d"}, 0xda) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)=""/169, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x8000}, {0x0, 0x2}]}, 0x18, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='cpuset\x00', r4}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x9) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2107.385189] audit: type=1400 audit(2000000603.049:76439): avc: denied { map } for pid=10696 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, 0xffffffffffffffff, 0x80000) [ 2107.513270] audit: type=1400 audit(2000000603.069:76440): avc: denied { map } for pid=10696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) socketpair(0xb, 0x7, 0x1ff, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e22, 0x7f, @remote, 0x8}, {0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x8, [0x100000001, 0x8, 0x4, 0x200, 0xe, 0x20, 0x7, 0xbfd2]}, 0x5c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) 03:43:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xfb}], 0x1, 0x9) [ 2107.672287] audit: type=1400 audit(2000000603.079:76441): avc: denied { map } for pid=10696 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2107.783324] audit: type=1400 audit(2000000603.139:76442): avc: denied { map } for pid=10696 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:24 executing program 0: syz_execute_func(&(0x7f0000000140)="41d9e1c481a114be25770000c463296c90f5aa449123c401d05dd4c4e1735f4399c4418172f50247040af0801a02c403f9632aa4c4c2791812") r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac14140008400000e96b0efeb288994bbefff50000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000081f7934796e858ef3506c62af35a55128e3b0075962caeebff6a1e8496dc319093c337ecbe29863e29c07c6e6ed01546083497a0ccf3b6a41d1b54b55583adcb6f9a190736b4c83a63316f2fbb2eb4d8b457"], 0x0) 03:43:24 executing program 1: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x80000, 0x9) 03:43:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, 0xffffffffffffffff, 0x80000) 03:43:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x80) 03:43:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) r2 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x1) flock(r2, 0x1) io_submit(r1, 0x8, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000040)="57064c2ee767a8b2db1f25a3c69ccb162fd0506221fb8ea93ae64f469c017ab15ec58c2415e70f0ab1ed7bbcca332b7b2d8a78c4af31ac1c091eb9274f8bc322b5b650337f2dbcf4eba5655a32d35349de81270f866b081f9622d3e087cb3cda2cea39af854acc7acc8c2c86da6a038c7da8b14eb47b96c6ff7d91", 0x7b, 0xaad, 0x0, 0x0, r0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xb, 0x2b3, r0, &(0x7f0000000180)="394aa31da4e785d28f8293f998e09aebb3ae05d67d97858d208eb5c907d21167c7c6d4b6b4820cf2c27ce30c1342b4c7402c91816c408681d5f21aeeb93d605fc512fe138a5529af0566d01b8efaace9156e8b23e51d411e5ae7ad3cc437f25acc39e4870ba8665ae456135d283598287aefaaf0a63ed0f1b78aeebfb9bf5de79ec56a8f5f9206ce2620a01acab2b84387054d3d3cb4a89de99e473805b341bda7a7df180766f87d1f973baa0aef3820", 0xb0, 0x46, 0x0, 0x1, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x800, r0, &(0x7f0000000240)="c950d8b019ceaba6780b354f219de82abf99ccc9b855d747bc7e17683495bf447abfe9f11d800adf4f8e145053a431be18aaae241f69ad4f", 0x38, 0x3, 0x0, 0x3, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0xcaf1, r0, &(0x7f00000002c0)="597b52f02a789bc8a1fbe7214a3a73f6a250dbaa809f886402a1c9ac4b34d43550d47c3216cedde4fe462ffe5013b374e061d327214511998d139b2ec4b9a9404060704a828bee60320ebe5b1953a29d162f266de7aac5c3d394a482b2d47b7680aad756b4", 0x65, 0x8, 0x0, 0x2, r0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x10000, r2, &(0x7f00000003c0)="fb95a153b9f7bb951787f6003e", 0xd, 0x3972, 0x0, 0x1, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x81, r0, &(0x7f0000000440)="af9d3c3de393b583bc23cade681c563bc656427d0509f3d88836225ce44b089d74a0425000389c4479bab5aed705116289304b2ff0185795eaeee836cb216a42a62094daa8dffed64c439255ac12b7720566727fb5f901d5c4e2ea2ddf347b38521de580df899fc69c2c71b62c36298412835e6b17665acfe4d04e", 0x7b, 0x2, 0x0, 0x3, r0}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000500)="61ef2614895effc7f9d59311cdd5ae8fd9ac0a79faec798b14c136031f1401f7569df1446dd03d3c08714e867b54f710bedb772e2ff34aea89d9c3de7481331eaaf0fd0fec98ff5661da37400264fb726c4c149c3539be8a7074f996041f05ae75ca16bdf583b1b57fc7219c8bbbef0682815c1b746433f325418b20cf6a2b5a0c6825a021097d84fde95c1e105ad10556b9988f56f8d6955e398983193a5efef155a716a32214de1b7cc93015cda76052916f957242f2bfee3f8021eb33266de17a806cab843bbdbc49c67178", 0xcd, 0x80, 0x0, 0x2, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f0000000640)="ed0bba8dba25e43a14a4d9c41a7bfd75b8cdc22f9bab61081818984ca878e6dc86bf2caecaa7aaaa20511a9eaf5200fbaf1a", 0x32, 0x9, 0x0, 0x2, r0}]) 03:43:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000140)={@rand_addr, @multicast2}, &(0x7f0000000180)=0x8) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac010000001414110404900100000000450000000000000000010000ac23148aac141400084000000000000000000000e0a2b09d287c04251400000100000000000000007f00000100000000ffffffff00000008e000000100000000ac14140000000000d75bfcbbb423462512a0903746bec92842457c8a560fa3e8ae83181dc4778f9dfbf215cd41ab0d3bc1be32e73c3dcfdcee3c3ae6a1124e4574c6f55e4e6f982cb99d9459018a06b264361f2040f6f03176917a63864fb95cb34c6918fb4f6bd7165bb8404496ef4309fb7d2e81f9b8e38421d229c8b9fe732ae214b9e26da1af"], 0x0) r1 = geteuid() r2 = getegid() chown(&(0x7f0000000040)='./file0\x00', r1, r2) 03:43:25 executing program 4: r0 = socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r3) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r4 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10000, 0x2, 0x2, 0x8001, 0x0, 0x80, 0x40, 0x1, 0x3, 0x2, 0x8, 0x9, 0x80000001, 0x9, 0x3f, 0x5, 0x7, 0xbb6f, 0x5, 0x8, 0x100000000, 0xffffffff, 0xffff0000, 0x8, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x9a, 0x3, 0x800, 0xff, 0x0, 0x534, 0x2, 0x0, 0x83, 0x7, @perf_config_ext={0x4, 0x81}, 0x84, 0x10000, 0x8, 0x2, 0x8000, 0x8000, 0x5}, r5, 0xc, 0xffffffffffffffff, 0xb) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x2080) dup3(r0, r1, 0x0) 03:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040)=0x5a8, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000100)=""/192, 0xc0}, {&(0x7f00000012c0)=""/209, 0xd1}, {&(0x7f00000001c0)=""/117, 0x75}], 0x4, &(0x7f0000001400)=""/189, 0xbd}, 0x10102) 03:43:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x1000000000000165}, 0x68) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) 03:43:25 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40aa40, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c000000310008002dbd7000ffdbdf250000000048000100100008000000080001006270660000001400190000001000120000000800030009000000000010001e00000008000300e300"/92], 0x5c}, 0x1, 0x0, 0x0, 0x8010}, 0x10) r1 = socket$inet(0x2, 0xa, 0x60) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r2, @ANYRESOCT=0x0], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4008001) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() fcntl$getownex(r1, 0x10, &(0x7f00000004c0)={0x0, 0x0}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000d80)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000dc0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ec0)=0xe8) fstat(r1, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000f80)={0x0, 0x0}) r13 = getuid() fstat(r0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getpgid(0xffffffffffffffff) r16 = getuid() getgroups(0x2, &(0x7f0000001040)=[0xee00, 0xee01]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001080)=0x0) getresuid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) getresgid(&(0x7f0000001180)=0x0, &(0x7f00000011c0), &(0x7f0000001200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001280)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f0000001240)='TIPCv2\x00'}, 0x30) r22 = geteuid() getresgid(&(0x7f00000012c0)=0x0, &(0x7f0000001300), &(0x7f0000001340)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001800)=0x0) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0, 0x0}, &(0x7f0000001940)=0xc) r27 = getpgrp(0xffffffffffffffff) fstat(r1, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002cc0), &(0x7f0000002d00)=0x0, &(0x7f0000002d40)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002d80)={0x0}, &(0x7f0000002dc0)=0xc) lstat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002f80)={0x0}, &(0x7f0000002fc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003000)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003100)=0xe8) stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000003200)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003240)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000003340)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003380)={0x0, 0x0, 0x0}, &(0x7f00000033c0)=0xc) sendmmsg$unix(r0, &(0x7f0000003500)=[{&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000540)="0650714b6c48874a23fb4b2cc43991bcf3cb63c9436f69739ce848402cffa59bdc04c1e73c337bc62c934c2641e52dfd8388a3cc8a4a16bb87a7fe2eb6207bfe441392657e8b91192270c2992792aa4dc2369eb95087bbc378020b00f18b7f6ad57dfc01a405a8aaa0a7f60bd542771812d33589aca78537c8c4bd26cd6278c9c3e497ecfb9a916be039674a9aef6ec76e5755429e777c134399096af2e626b044c50d697c1bb3c0cf10add30e743b993c39e16b759610647f644c3bf5a1187f45904e", 0xc3}], 0x1, &(0x7f0000000840)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x58, 0x24000011}, {&(0x7f00000008c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000940)="f10d3a9c7c9e479bd8ed0c1f3a5a34e1e206df581a343a4993ae2c60361721e33819b0293254c02d606c2fa7334ff3a593a37a181bdd062b890cdb72795090b8190b35ae", 0x44}, {&(0x7f00000009c0)="044274d85f7b649cd0699d02031d0427efdd9c90e350b3449af523103d238a99a9d4a58a63bb323e7affab", 0x2b}, {&(0x7f0000000a00)="65eabcb639b7e7669ceed8c488626f3c13ec779caaa57eb8d2ddee1f9b15d3fbf392b1b5902938b93bcadf2265752f8b6191da64d2cf455a5e8b7453581a2a176809e94747685f2fe745b568d84ebac137731df753de50af25e9c9a1ad5daa577d33c3fe42235396fa2650", 0x6b}, {&(0x7f0000000a80)="5016910cc630b8d35d72e23205491b1d2f9fbb43a1a0c9def418cf81d75362c6b328a49b84a49dc022e6f181c82b215211a9285d971f8717d29a87eba78aa495ea2df03344c1397c20552cd7692025a03587396a15f067bca0f3a0977aefb79ec645e01798e87cd83f3cbdbffa2bb5f37dee1c6ad09f1f799947b798189796304f", 0x81}, {&(0x7f0000000b40)="55ed612533afdbfe5a557cca0e6cd9aa15a718b81dc939becf94221cf27692f8940a786f56a1b624a99c3d8b6d6f2e9f6ce17227a27f5cd78598bf420cded13609cac8635fc165e25016ea2a335558c40aa427b7663256f91de034918174b25777b1b69ebea2ce5fc1c9ac715825b31d9ace3b18ecba2b409d8a71bd0b7e66f26e5d3b7c05bf0c9137b5c0bcce8b0c322546754921b3103600c2c607691cab501b808ca4f65e8c243e5decc528acb6929f074cfd7272ff5e3efe553655ff9a2b6b8151b3a66b163673818cc0e9877bf2e121fcd8b3afa5143dfe6fbbc5f8afdd4d635b241743437181", 0xe9}, {&(0x7f0000000c40)="ea17fe974e8421a0d2568602b1076652701c35b742beac3eb3f47b987b1e76ee4b8363a87c031ac25b4bd1be377406a6fd622c060a81d6bfec6cbcde52730f3b37d07dbe81a0e5ebe9a6316f3db5d1eb7bd79a32e1e0bad1a2061b2d41229bc2601005c114a65aabb4120500d77327274dbdef0199af2f8b729970d1f9c81011fce75e6e0db1689d045b90a6244a2b1bae6b", 0x92}], 0x6, &(0x7f0000001380)=[@cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r1]}], 0x110, 0x1}, {&(0x7f00000014c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000017c0)=[{&(0x7f0000001540)="8621be3ebb7f3a4261d5988bdc0a7e0d2c6d16392d961db21f7bab228a341ae27062e6349b23da029dc65e45a0f4268abeaf7ceef9795d66bee95e64d1299e464e01a88fa23d640b398803cc3a7dbaa3c60cd257d9d8f95271a9677ef4c4a1bb642aab645632c91b3888d167e2acb98898e3150c5ccce26d24", 0x79}, {&(0x7f00000015c0)="05d157d20aba38aec90a0278b2a98ee57122528a88e9b7b58622164e8209af7796c4e54e287c7ceaf07253a4afdf9ce8982e99c9668f32e9bd9c60394e17d934de141aa5539654baf6fe86d6549cfcec7faf359ac79f4b7baea816330145196b0f4f83287d400e4994f21a523bc69e6e4f68765ec83727d92c4e48d45cfa3c98bf2d7386807154b9118aaab374571cd3054e61935e710b64702bbcef144c506f260fec5ec7fe101d555bd7404ee2dbbc284b48c13d1c17f93a9bfb4d", 0xbc}, {&(0x7f0000001680)="1c34a28dd6ba4a21155fcb732676d0e645c34037", 0x14}, {&(0x7f00000016c0)="06031f4861af3755366fde6538ff1780dc90eff33932f2b562668f0c6ca043d860ecee41e6664628d00184c943b19d5487954ce1563a4a157f57e29a6ababbf68e17520b971824592fef0545ac457025974f114f2202aa829782aaf4ed93f4cec61d7c56ea1ea78bb6177cda5133bdbfdac8cc67fab954ed725b702f9130e7a4d23b7e12c36a3c8e568c9f03eb21df0b260f53fdd6e98e7941b1e5dc264dfefc194929b71539059ce2db25f7d32cde034faffc662da5e8982873650125e5c3f724e0bd4858b4c549d834bb1af55f0b8399b2ca9cc6af986326e7b190e0edb91c176abc8820af9438ce9ab5", 0xeb}], 0x4, &(0x7f0000001980)=[@cred={0x20, 0x1, 0x2, r24, r25, r26}], 0x20, 0x4004804}, {&(0x7f00000019c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002c00)=[{&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="0960ba21ed1141093803e0dfef6e5543ce91d2e484421e664b6463ebebd6ff06f958a9e7d265142b67d94c9a44e60dfa914673df2666f19f2503601440c8e8a94b8f1988e3780754a3189202e15ff00b312b684ca983649321177c994165d8b24f6506a24f5e8bca6964677d3486896edf8b0090870c9e97b461566fe573", 0x7e}, {&(0x7f0000002ac0)="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", 0xfd}, {&(0x7f0000002bc0)="bcac0aa08c1fbcff2b0a60a6e872a2969ed0c547d468f05e10b323466ca28163d320bcb15faee2a1caaaf634f78e220c3bce0cc6454fc5943d", 0x39}], 0x4, &(0x7f0000003400)=[@rights={0x20, 0x1, 0x1, [r1, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @rights={0x20, 0x1, 0x1, [r1, r0, r1, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @cred={0x20, 0x1, 0x2, r33, r34, r35}, @cred={0x20, 0x1, 0x2, r36, r37, r38}], 0xe0, 0x20040000}], 0x4, 0x4000090) getsockopt$inet_int(r1, 0x0, 0x19, 0x0, &(0x7f00000000c0)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000280)) 03:43:26 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x80000, 0x9) 03:43:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = dup3(r0, r0, 0x3c308208258e4b3) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/194) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x2}, 0x18) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:26 executing program 4: r0 = socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r3) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r4 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10000, 0x2, 0x2, 0x8001, 0x0, 0x80, 0x40, 0x1, 0x3, 0x2, 0x8, 0x9, 0x80000001, 0x9, 0x3f, 0x5, 0x7, 0xbb6f, 0x5, 0x8, 0x100000000, 0xffffffff, 0xffff0000, 0x8, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x9a, 0x3, 0x800, 0xff, 0x0, 0x534, 0x2, 0x0, 0x83, 0x7, @perf_config_ext={0x4, 0x81}, 0x84, 0x10000, 0x8, 0x2, 0x8000, 0x8000, 0x5}, r5, 0xc, 0xffffffffffffffff, 0xb) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:26 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) waitid(0x2, r0, &(0x7f0000000040), 0xb, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r1, 0x0, 0x10111) fdatasync(r1) 03:43:26 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='cpusetwlan1em1em1!}{\x00', 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r2) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r1 = dup3(r0, r0, 0x80000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xf, 0x1}, 0x10) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000c0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:43:27 executing program 4: r0 = socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r3) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r4 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10000, 0x2, 0x2, 0x8001, 0x0, 0x80, 0x40, 0x1, 0x3, 0x2, 0x8, 0x9, 0x80000001, 0x9, 0x3f, 0x5, 0x7, 0xbb6f, 0x5, 0x8, 0x100000000, 0xffffffff, 0xffff0000, 0x8, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x9a, 0x3, 0x800, 0xff, 0x0, 0x534, 0x2, 0x0, 0x83, 0x7, @perf_config_ext={0x4, 0x81}, 0x84, 0x10000, 0x8, 0x2, 0x8000, 0x8000, 0x5}, r5, 0xc, 0xffffffffffffffff, 0xb) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x20000, 0x0) read(r0, 0x0, 0x67) write$binfmt_aout(r0, &(0x7f0000000180)={{0x1cf, 0x0, 0x3, 0x39a, 0xce, 0x4, 0x31d, 0x9}, "4d866c276739bc25b481d129f8626ce707153f23b75e7235a63d4a06b7e2ec4fc11f25bddfceb6822383b509fce7fd14c5e3a8cec160912f54d8a3522eabdb83201565f746e31472f64c780fec7ad90fd0825478327562fc334024c35249045f6277efbe457046ee6424a7ef7e1fad7200f90ef7e37caf9a4e141a31fcd674425ecfde9c9b8abe856d673dac87ef1c2682dcb6c433ae0953ac897a6fb0864315067088f2a2a1d002635971eab8e124f6d86797df63141b07a61aeeec4c72cefe64a54a224337d18f602246bf4ba9bb4824712b0e38e0ca05665ee0753787f98089"}, 0x101) 03:43:27 executing program 1: r0 = socket$inet(0x2, 0x100000000000002, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) r1 = socket(0xb, 0x2, 0x7) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, r2, 0x4, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x18}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3e}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) socket$netlink(0x10, 0x3, 0xb) r3 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r3) 03:43:27 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x80000, 0x9) 03:43:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r0, 0x4, 0x2000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r1, 0x4, 0x27ff) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) 03:43:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000080)=0x9, 0x3ae) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2111.491399] kauditd_printk_skb: 214 callbacks suppressed [ 2111.491408] audit: type=1400 audit(2000000607.909:76657): avc: denied { syslog } for pid=10819 comm="syz-executor.4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:43:28 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10000, 0x2, 0x2, 0x8001, 0x0, 0x80, 0x40, 0x1, 0x3, 0x2, 0x8, 0x9, 0x80000001, 0x9, 0x3f, 0x5, 0x7, 0xbb6f, 0x5, 0x8, 0x100000000, 0xffffffff, 0xffff0000, 0x8, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x9a, 0x3, 0x800, 0xff, 0x0, 0x534, 0x2, 0x0, 0x83, 0x7, @perf_config_ext={0x4, 0x81}, 0x84, 0x10000, 0x8, 0x2, 0x8000, 0x8000, 0x5}, r4, 0xc, 0xffffffffffffffff, 0xb) [ 2111.717904] audit: type=1400 audit(2000000607.919:76658): avc: denied { map } for pid=10820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:28 executing program 2: syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) 03:43:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x800000143fe, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) chown(&(0x7f0000000080)='./file0\x00', r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) [ 2111.918877] audit: type=1400 audit(2000000607.929:76659): avc: denied { map } for pid=10820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x404000, 0x101) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, 0x3, 0x0, 0x52d, 0x400, 0x8, 0x480000, r2}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 2112.107818] audit: type=1400 audit(2000000607.949:76660): avc: denied { map } for pid=10820 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2112.227063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2112.257164] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2112.259076] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2112.285401] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2112.286190] audit: audit_lost=2069 audit_rate_limit=0 audit_backlog_limit=64 [ 2112.312032] audit: audit_lost=2070 audit_rate_limit=0 audit_backlog_limit=64 03:43:28 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x80000, 0x9) 03:43:29 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 03:43:29 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @loopback, 0x4e24, 0x2, 'wrr\x00', 0x14, 0x3f, 0x11}, {@multicast2, 0x4e24, 0x4, 0x200, 0xb8, 0x400}}, 0x44) 03:43:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x442040, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x1f) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r0, 0x4, 0x2800) 03:43:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x3e5) 03:43:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffff08002a0000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac14140008400000000067081442c16c000000000000e000070000000000e000000100000016e9a2bac5ea8bd6222adc56c200000000007f0000010000ffffffff00000000e000000100000000ac1414000000000000f2002f78ff41dcde21f3417d7c9e76a94f20393156d7345d8966cf3b1b8e8e6cc12a85ad92d777bc14abed0834b88bc7b347d589d1869da1115afb1263060e65e9164662"], 0x0) close(r0) 03:43:29 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) add_key$user(&(0x7f0000001600)='user\x00', &(0x7f0000001640)={'syz', 0x3}, &(0x7f0000001680)="82bb722bafca534739b814c5680097cd09547650437a0c0a445a079bf20e27aa833d4a883ad6be9e24d44f83c5504ed1fa78e1f62d58ca900b2715b039d0f7bbf35550959090b82587a3d86cb935201b24152ce3cba22b6c2317888bc2776bfefc86721e82c127c74b75a7067315bad5d67d9ad915637f42d0f2a959461036cc88500ab4b4dc18b2878a8953e54708117f8491059fcc2496933e542cf88c03300877773dc65aa9dea145f35e88f3e21974", 0xb1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) fsetxattr$security_evm(r1, &(0x7f00000015c0)='security.evm\x00', &(0x7f0000001900)=@sha1={0x1, "7894dac09fd701cdaeecb5bdadf1f8524141aa3a"}, 0xfffffffffffffd47, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001400)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x5, &(0x7f0000001380)=[{&(0x7f0000000140)="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", 0x1000, 0x8}, {&(0x7f0000001140)="d1d4b79ebfcc1973e1c204f3eaad4ffc862fdf44c1ece321df2a04edb6efd44d81dc61bfbeba68c53659d44eea9c4d76ce14e0900a855e75f809d0a897f318d0e2daadc5f9546b861466d348b7bcc1f6a0a17042fed075681d3d08ffca26631583e9ffdbd5979476fab0dbda0b632d4ac5dfa0fdb377e4cb11e28bf5fd35debebd6541fdd88e5238776b439468259e1a1b2b2e71a393d0832b9741adaf", 0x9d, 0x1000}, {&(0x7f0000001200)="73eeb65d97d33506d082291c2822aa0e269ccbc3c9403a77ed6bdd8d1bf5fd17658567808bebab8bdf307c40f94a465115dee9c68b7e2c242938b0b0dab89a3f9186092b8ba5adb6ae478fb58271a4359c3e7c2ee4c42b82a753acbd8e798800eba50eb626ddfe341b32aa6318b32e66e18aaa3115ef0233fd7eeecb656fdfe0dfda61b890e0fda95e06fe230642df3d7feb8a7084bf37a0a262234ec2eaf5ec3e1dfe1896e3d0cf549e57ab4650586860468ecb0a1c7d8a557125f1190818fa031e30781ff3f4a60476a1713a92340062d520568d74d7f16c7c1ac1114d03117f66eb53bd4edc17c70bfa6fa17b56", 0xef, 0x100000001}, {&(0x7f0000000080)="62a30e98e845e0c2c546a3f6f8721f28abbbd0748ab1dc67ab162948a319b71caf93842a4844fdcff91c", 0x2a, 0x8}, {&(0x7f0000001300)="d262455e73e0ea25f5c469be16090050b3ae3dc7de607fae86dbea24ff83df1c5222851851ae05ab4f5d69294ded4b177a979dc2ee8be6efae626e90dc59cedb87aa72037f6783edf6c557cf812a14dec6a1a7c7d595a45384fdbca99975ec239fa80db50e40746fb56b87ab14e1c497602dc7", 0x73, 0x80000001}], 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="646f74732c646f74732c6673757569643d36337f34377700182d647700332d663d34322d003866762d7f3065773e7230652c657569643e", @ANYRESDEC=r2, @ANYBLOB='.\x00']) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001800)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000001740)="fcef666db04aa88a4aec381dab500ef57b0351526cde04bc3cf5ce53d81559bf7ec7199cfe733849ebbcc2cdbe35674c7b5cbdf298ce79528ed5305f286f88beb6dbf1465a68d47356f92157e20a441ba3e20aa2c4d79fc4b6e76955c4e072ea5e93ac3115dbeb21b90e11e96dfc64f6b60932c5be5061571cbf83f9421cb8f8ae4b66f4825d14b3892a8a410545edf72717a2febad51b65c50eee381c6ee9320f0ecd65cb357315c60e883c7334fcefbd91bb064e9e3115", 0xb8, r0}, 0x68) 03:43:29 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) 03:43:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f00000002c0)=""/4096, &(0x7f0000000080)=0x1000) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffe16) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000000c0)) read(r0, 0x0, 0x0) 03:43:30 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") 03:43:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x112a, &(0x7f0000000440)={@broadcast, @broadcast, [{[{0x9100, 0x3ff, 0xd64, 0x3}], {0x8100, 0x40, 0x1, 0xfffffffffffffffe}}], {@mpls_mc={0x8848, {[{0x800, 0x5, 0xfff, 0x401}, {0x100, 0x1, 0x6, 0x4}, {0x542, 0x800, 0x3, 0x8}, {0x40, 0x800, 0xffff, 0x7ff}, {0x5, 0xc85a, 0x0, 0xce7}], @ipv6={0x9, 0x6, "5f241f", 0x10d8, 0x62, 0x101, @mcast2, @loopback, {[@dstopts={0x0, 0x6, [], [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x20, {0xacd6, 0x6, 0x1, 0x8001, [0x5c3, 0x7, 0x4]}}]}, @srh={0x0, 0x8, 0x4, 0x4, 0xfff, 0x28, 0x6, [@remote, @mcast2, @local, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}]}, @routing={0x87, 0x2, 0x2, 0x7, 0x0, [@mcast2]}, @fragment={0x62, 0x0, 0x1, 0x9, 0x0, 0xfffffffffffffffa, 0x67}, @fragment={0x2b, 0x0, 0x5, 0x401, 0x0, 0x3ff, 0x65}, @routing={0x33, 0x2, 0x0, 0x2, 0x0, [@mcast2]}], @dccp={{0x4e22, 0x4e22, 0x4, 0x1, 0x9, 0x0, 0x0, 0xf, 0xffffffffffffffb2, "0fa48b", 0x0, "671773"}, "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"}}}}}}}, 0x0) 03:43:30 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:30 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 03:43:30 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) r1 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r1, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:30 executing program 3: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x5) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x1d, @loopback, 0x4e22, 0x2, 'ovf\x00', 0x4, 0x5, 0x30}, {@loopback, 0x4e21, 0x3, 0xfffffffffffff801, 0x4e, 0x7}}, 0x44) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) 03:43:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) read(r0, 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000000)) 03:43:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0xcb, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipx={0x8137, {0xffff, 0xbd, 0x0, 0x14, {@current, @current, 0x7fffffff}, {@broadcast, @random="ea8958512f83", 0x10000000000000}, "f54aefc07b3dc9869a3ed9976f05d64e150cd27c486fa8623097d8acfd9925b7bffa23c6b76ff0db4376b2d41ed1fdd5910109e30c2f67a1e22453e64d0a5013197b88d0bb7f7e3af0e4a360d1f7e8dd98d5fa41e3177d2272467d7d55769574f36e9a5101375b85fe246d603487d9bd1a2ec81e5e4625bdcf7494700f80737a5b3b50344f50cb2d9ad7fd368be02cd37c0d300c3ccae030cb7735b2dc8418"}}}}, 0x0) 03:43:31 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000100)=0xff14) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f0000000000)="dc82eec262883ab0767100fa643960b15e8802a0fcce827cf27796d31fb57748ad628584a36b38329db887333eb8aef3a61220b8633eceadfea25797b1a6d1846b9330ea24b4203fd7285be0a9449110159c14fa65e42f8cf8585873a66147bc3ff353c57b9597a624f8c48450cda52ae30d7ca9774f2aa87ee43da692ad") dup3(r0, r0, 0x0) 03:43:31 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) socket$inet(0x2, 0x100000000000003, 0x60) 03:43:31 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) 03:43:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="1d5e8f8f1edae68af2ff80b9bc6af94a54655c4d39cbfc8fd06ba849174fc0efdf56eaef1415c6e29efa60b6813061f8f49e7512a5fbc86bcf0eb19e70a7f246b3e6e82c046bf1bfe11c24dab9c8e822c6111786d32fff9b020000000000000077f4c2723dc292fd45879b5c14bfc5a97ac80e74c1ba7518c7cf003fa36fd896a2b51dd71c8e5c7171a1c73caaa290b5c1a0bd359d759dcac2e9958a8b245364b32203f0b9513189f6bfcf0bb0d5ab17782284dac06c2ffcac4c4347b525c1f6f71c058e5078878ac1") r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) fcntl$setstatus(r0, 0x4, 0x2800) 03:43:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x1ff, 0x589, 0x1}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:31 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) 03:43:31 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@loopback, @empty, @rand_addr=0x5e8}, 0xc) 03:43:32 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) 03:43:32 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x193000, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r1, 0x72c, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x7, &(0x7f0000000040)=0x0) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x80000001, r2, &(0x7f0000000080)="961f87aed22651df7a1615313c94a5e768a3d16251cf1deec71b836e39301a882d57123a0c63b614b81254f3131aa49dd3aecee6fc49dc", 0x37, 0x400, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000100)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$setstatus(r2, 0x4, 0x40c00) 03:43:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000140), 0x4) fcntl$dupfd(r1, 0x406, r1) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffe3dee4cf05080045000070614df4629917caff183039b5000000000001901403000404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e0000002000001000000000000000000000000007f00000100000000ffffffff006e22ab1f000001000000000000000000"], 0x0) 03:43:32 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:32 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) 03:43:32 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x2d) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r2, 0x0, 0x12, 0x0, &(0x7f0000000100)) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000140)=0x90, 0x4) 03:43:32 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 03:43:32 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @loopback, 0x4e24, 0x2, 'wrr\x00', 0x14, 0x3f, 0x11}, {@multicast2, 0x4e24, 0x4, 0x200, 0xb8, 0x400}}, 0x44) [ 2116.504999] kauditd_printk_skb: 326 callbacks suppressed [ 2116.505009] audit: type=1400 audit(2000000612.919:76972): avc: denied { map } for pid=10966 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RREAD(r1, &(0x7f0000000380)={0xb7, 0x75, 0x1, {0xac, "b6371d5d3f1807bce5ab4241d2a04248eb155a2d83b5e4af6224e76b71b8b93d3c8975a6a242b3f9c3e9112d6e99c8189cea10c383876700437f824b2cab1932ad2bcb1cde86f1c988779875fcbf1eaa639badfc7605437467dd25f8a7e2022749144df319eda87b2622193bf41f8adb2091c07a8e00afdc36db17fa408299d0dea052802639cf72fcd809f1f2cad563430e9360ea122ea1aaa32abde3a7ef1b13b3427d020df48af84a09d4"}}, 0xb7) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) ftruncate(r2, 0x2) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='security.SMACK64IPOUT\x00', &(0x7f0000000300)='/dev/null\x00', 0xa, 0x2) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x80800) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={@remote, @rand_addr="3259c0b6560441e2b7280b882a60c729", @local, 0x0, 0x5, 0x0, 0x100, 0x5, 0xc0000000, r3}) syz_emit_ethernet(0x7e, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac14140104f140ff69eeefe7290000000000000000010000ac2314aaac141400084000000000080000000000e000000200000000e000000100000000000000007f00000100006900ffffffff00000000e000000100000000ac14140000000000"], 0x0) nanosleep(&(0x7f0000000080), &(0x7f00000000c0)) 03:43:33 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) [ 2116.740213] audit: type=1400 audit(2000000612.959:76973): avc: denied { map } for pid=10970 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2116.854793] audit: type=1400 audit(2000000612.969:76974): avc: denied { map } for pid=10968 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:33 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2117.000350] audit: type=1400 audit(2000000612.969:76975): avc: denied { map } for pid=10966 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:33 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @loopback, 0x4e24, 0x2, 'wrr\x00', 0x14, 0x3f, 0x11}, {@multicast2, 0x4e24, 0x4, 0x200, 0xb8, 0x400}}, 0x44) 03:43:33 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000900)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x278, 0x140, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000640), {[{{@arp={@broadcast, @multicast1, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, 0x5, 0x5, 0x2400000000, 0xb7c, 0x8, 0x4, 'teql0\x00', 'ifb0\x00', {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x29}, @remote, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x401, 0x9}}}, {{@arp={@empty, @empty, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0x8, 0x2da, 0x40, 0x0, 0x0, 0xfffffffffffffffc, 'batadv0\x00', 'bcsh0\x00', {}, {0xff}, 0x0, 0x84}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @rand_addr=0x2, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) 03:43:33 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) 03:43:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000001300)=@get={0x1, &(0x7f00000012c0)=""/46, 0x2}) sendfile(r0, r0, &(0x7f0000001280), 0x100000000) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000140)=0x9, 0x35a) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x440000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001240)={r1, &(0x7f0000000180)="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", &(0x7f0000001180)=""/152}, 0x18) syz_emit_ethernet(0x7e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110404907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000c1a9ba765118b025adef0f6bb2113d8a0448fb06d89f61ed6d6bc60d9d5d8b9969944fd2f4098794b204bdf0d9eb25b9b268e0f7de64936cf852eb9c22ee6afa616b65c8ec801f64a8de3cd54548d28d4de07e99c03a26b04f495f63def41433ae2dc7cdb78f4aae546154f75a63749ac3"], 0x0) [ 2117.260147] audit: type=1400 audit(2000000612.979:76976): avc: denied { map } for pid=10968 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:33 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) [ 2117.390132] audit: type=1400 audit(2000000613.029:76977): avc: denied { map } for pid=10970 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2117.511388] audit: type=1400 audit(2000000613.029:76978): avc: denied { map } for pid=10970 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2117.622550] audit: type=1400 audit(2000000613.029:76979): avc: denied { map } for pid=10970 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:34 executing program 1: r0 = socket$inet(0x2, 0x100000000000002, 0x60) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2117.826567] audit: type=1400 audit(2000000613.049:76980): avc: denied { map } for pid=10968 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:34 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) 03:43:34 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @loopback, 0x4e24, 0x2, 'wrr\x00', 0x14, 0x3f, 0x11}, {@multicast2, 0x4e24, 0x4, 0x200, 0xb8, 0x400}}, 0x44) [ 2118.012759] audit: type=1400 audit(2000000613.049:76981): avc: denied { map } for pid=10966 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:34 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 03:43:34 executing program 5: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f0000000080)="b072354f6593a2aaec6dcc525f406d3c0b7f76889efffc264cae05f5fa005a9da729ffcc40b643c75c43c7940f88e16838b2e77e4a59d88591218af350220d95b9ad51997f056ef4c56fa5ccad2456d254e65dd6dcf14627b6152ac0dd367c9b2351491bc7dae223c2f435f0376c64dddd4d0d1e7cee8d94406decc23f0b4bfe937957dcc1388f8c4da5041cbc2f78bd388c631860b9a88dab0bb70e2006456dc274b616a2cedaed412d95023d3e2746d864ed5421a603edfb242d7f45", &(0x7f0000000140)=""/82}, 0x18) 03:43:35 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:35 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) 03:43:35 executing program 5: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:35 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) 03:43:35 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 03:43:35 executing program 1: r0 = socket$inet(0x2, 0x100000000000006, 0x60) readahead(r0, 0x81, 0x1) getsockopt$inet_int(r0, 0x0, 0x17, 0x0, &(0x7f0000000040)=0xd8) 03:43:35 executing program 5: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:35 executing program 3: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:35 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:36 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) 03:43:36 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 03:43:36 executing program 3: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:36 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:36 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:37 executing program 3: getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:37 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 03:43:37 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:37 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 03:43:37 executing program 3: r0 = socket$inet(0x2, 0x0, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) [ 2121.476713] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:38 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) [ 2121.545231] kauditd_printk_skb: 308 callbacks suppressed [ 2121.545240] audit: type=1400 audit(2000000617.959:77290): avc: denied { map } for pid=11099 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:38 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) 03:43:38 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:38 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") [ 2121.800169] audit: type=1400 audit(2000000617.969:77291): avc: denied { map } for pid=11099 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:38 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) r3 = openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000540)={0x80000000, 0x9, 0x40, 0x1, 0xa, 0x8, 0xffffffff, 0x9, 0x5, 0x6d64}) [ 2121.971069] audit: type=1400 audit(2000000617.969:77292): avc: denied { syslog } for pid=11101 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 2122.125071] audit: type=1400 audit(2000000618.009:77293): avc: denied { map } for pid=11105 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.283651] audit: type=1400 audit(2000000618.019:77294): avc: denied { map } for pid=11105 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2122.375075] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2122.419111] audit: type=1400 audit(2000000618.049:77295): avc: denied { map } for pid=11105 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:38 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:39 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) [ 2122.587826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2122.602959] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2122.615733] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2122.626352] audit: type=1400 audit(2000000618.059:77296): avc: denied { map } for pid=11099 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:39 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x101000, 0x4) 03:43:39 executing program 3: r0 = socket$inet(0x2, 0x0, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:39 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:39 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") [ 2123.274333] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:39 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:39 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) 03:43:40 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) [ 2124.069394] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:40 executing program 1: r0 = socket$inet(0x2, 0x100000000000003, 0x60) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, 0x0, &(0x7f0000000100)) 03:43:40 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:40 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x100, 0x40000) 03:43:41 executing program 5: socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:41 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2124.722080] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:41 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:41 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:41 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="faa45fd3047e75f0bd67400cb29e3bbba3c8b19a0601de0c047be72925d74e56d3483ffae3d988f2d6671a276c7907048d9733d9bf0915311faa2d2fe13b3e7ca4797d30f25d869b7d3701765456c7a0e7279750a7bb393838f8896f4d24c141e1bbf7762588052e0f", 0x69, r2) 03:43:41 executing program 5: socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:42 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2125.642289] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:42 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:42 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:42 executing program 5: socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x2, [@empty, @empty]}, 0x14) 03:43:42 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000003c0)='rxrpc\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', 0x0) 03:43:42 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:42 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) [ 2126.554529] kauditd_printk_skb: 420 callbacks suppressed [ 2126.554538] audit: type=1400 audit(2000000622.969:77642): avc: denied { map } for pid=11232 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:43 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") [ 2126.733338] audit: type=1400 audit(2000000623.009:77643): avc: denied { map } for pid=11240 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:43 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) [ 2126.890148] audit: type=1400 audit(2000000623.019:77644): avc: denied { map } for pid=11231 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:43 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2127.055582] audit: type=1400 audit(2000000623.029:77646): avc: denied { map } for pid=11236 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.212340] audit: type=1400 audit(2000000623.029:77647): avc: denied { map } for pid=11232 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:43 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:43 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:43 executing program 1: socket$inet(0x2, 0x100000000000003, 0x60) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) [ 2127.430836] audit: type=1400 audit(2000000623.029:77648): avc: denied { map } for pid=11236 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:43 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) [ 2127.611854] audit: type=1400 audit(2000000623.039:77649): avc: denied { map } for pid=11232 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.730141] audit: type=1400 audit(2000000623.039:77650): avc: denied { map } for pid=11237 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2127.753148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2127.760702] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:44 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:44 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:44 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:44 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 03:43:45 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:45 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2128.895996] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 03:43:45 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) 03:43:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:45 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:45 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:46 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:46 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) 03:43:46 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:46 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:46 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/100], 0x64}}, 0x0) 03:43:47 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:47 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) 03:43:47 executing program 4: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:47 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000005c0)) syz_execute_func(&(0x7f00000001c0)="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") 03:43:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 03:43:47 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) 03:43:47 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:47 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f0000000080)) 03:43:48 executing program 4: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2131.562257] kauditd_printk_skb: 378 callbacks suppressed [ 2131.562266] audit: type=1400 audit(2000000627.979:77991): avc: denied { syslog } for pid=11362 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:43:48 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 2131.712886] audit: type=1400 audit(2000000628.049:77992): avc: denied { map } for pid=11367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 2131.885433] audit: type=1400 audit(2000000628.059:77993): avc: denied { map } for pid=11367 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:48 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) 03:43:48 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2132.052835] audit: type=1400 audit(2000000628.069:77994): avc: denied { map } for pid=11367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:48 executing program 4: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2132.243011] audit: type=1400 audit(2000000628.089:77995): avc: denied { map } for pid=11367 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:48 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2132.390994] audit: type=1400 audit(2000000628.199:77996): avc: denied { map } for pid=11367 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 03:43:48 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 2132.620648] audit: type=1400 audit(2000000628.209:77997): avc: denied { map } for pid=11372 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2132.637064] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2132.690543] audit: audit_lost=2115 audit_rate_limit=0 audit_backlog_limit=64 03:43:49 executing program 5: r0 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) [ 2132.739474] audit: backlog limit exceeded 03:43:49 executing program 4: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:49 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:49 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:49 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 03:43:49 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 03:43:49 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x0) 03:43:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 03:43:50 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:50 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x0) 03:43:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 03:43:51 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:51 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:51 executing program 3: r0 = socket$inet(0x2, 0x100000000000003, 0x60) getsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x0) 03:43:51 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 03:43:51 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:51 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") 03:43:52 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 03:43:52 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 2: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 03:43:52 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:52 executing program 0: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2136.579399] kauditd_printk_skb: 302 callbacks suppressed [ 2136.579410] audit: type=1400 audit(2000000632.989:78294): avc: denied { map } for pid=11514 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2136.788575] audit: type=1400 audit(2000000633.009:78295): avc: denied { map } for pid=11513 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:53 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") 03:43:53 executing program 4: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:53 executing program 2: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2137.091211] audit: type=1400 audit(2000000633.009:78296): avc: denied { map } for pid=11514 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[]}}, 0x0) 03:43:53 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2137.309303] audit: type=1400 audit(2000000633.029:78297): avc: denied { map } for pid=11516 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.494676] audit: type=1400 audit(2000000633.049:78298): avc: denied { map } for pid=11516 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:53 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) [ 2137.659429] audit: type=1400 audit(2000000633.049:78299): avc: denied { map } for pid=11513 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2137.692052] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:54 executing program 2: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2137.727563] audit: audit_lost=2118 audit_rate_limit=0 audit_backlog_limit=64 [ 2137.772554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2137.784482] audit: type=1400 audit(2000000633.059:78300): avc: denied { map } for pid=11507 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:54 executing program 0: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[]}}, 0x0) 03:43:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) 03:43:54 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") 03:43:55 executing program 0: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:55 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="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") 03:43:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[]}}, 0x0) 03:43:55 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:55 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) 03:43:55 executing program 0: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:43:55 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:56 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") 03:43:56 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:56 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:56 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:43:56 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) shutdown(0xffffffffffffffff, 0xfffffffffffffffc) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:56 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) 03:43:57 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:43:57 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @loopback}, 0x10) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:57 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) 03:43:57 executing program 3: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="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") 03:43:57 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:57 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2141.580784] kauditd_printk_skb: 412 callbacks suppressed [ 2141.580793] audit: type=1400 audit(2000000637.999:78698): avc: denied { map } for pid=11647 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:58 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000"], 0x1}}, 0x0) [ 2141.802142] audit: type=1400 audit(2000000637.999:78699): avc: denied { map } for pid=11648 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:58 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2141.977614] audit: type=1400 audit(2000000637.999:78700): avc: denied { map } for pid=11648 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$netlink(0x10, 0x3, 0xa) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80080, 0x0) fcntl$setstatus(r0, 0x4, 0x27fc) [ 2142.155947] audit: type=1400 audit(2000000638.069:78701): avc: denied { map } for pid=11649 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2142.295714] audit: type=1400 audit(2000000638.069:78702): avc: denied { map } for pid=11650 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:58 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000"], 0x1}}, 0x0) [ 2142.459053] audit: type=1400 audit(2000000638.099:78703): avc: denied { map } for pid=11649 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2142.487410] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2142.497149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2142.507966] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2142.515208] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0xfffffffffffffe0c) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x4, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 03:43:59 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:59 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:59 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:59 executing program 2: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:43:59 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000"], 0x1}}, 0x0) 03:43:59 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/151) 03:44:00 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:00 executing program 3: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:00 executing program 2: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f00000100000000000000000000000000000000000000002400090000000000"], 0x1}}, 0x0) 03:44:00 executing program 4: rt_sigpending(&(0x7f0000000080), 0x8) syz_execute_func(&(0x7f0000000580)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000200)={0xfffffffffffffffb, 0x200}) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x9) 03:44:00 executing program 3: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:00 executing program 5: socket$inet(0x2, 0x100000000000003, 0x60) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:01 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f00000100000000000000000000000000000000000000002400090000000000"], 0x1}}, 0x0) 03:44:01 executing program 0: syz_execute_func(&(0x7f0000000580)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e0200000091e74e5bc4a265aa104b26660f38091ec4837578bd87f98f2f15dee51bc421045f4607f2f0fe4900c466410f3a203f00620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b008000c20fc7f5414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd2450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb") epoll_create(0xff6) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/61, 0x3d) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:01 executing program 4: syz_execute_func(&(0x7f0000000000)="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") r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000280)) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xec, 0xffff, 0x6, 0x5, 0x0, 0x2, 0x20000, 0x4, 0x7, 0x10000, 0x30, 0x6, 0x0, 0x49, 0x4cbc78da, 0x4, 0x1, 0x2, 0x3, 0xfffffffffffffffe, 0x6, 0x7, 0x4, 0x6, 0x2, 0x4, 0x2, 0x0, 0x7ff, 0x100000001, 0x7ff, 0xfff, 0x5, 0xff80000, 0x0, 0x8, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140), 0xd87fc418385a786e}, 0x26, 0x9, 0x9, 0xf, 0x20, 0x4, 0x1}, 0x0, 0xb, 0xffffffffffffff9c, 0x8) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) fcntl$getflags(r2, 0x3) 03:44:01 executing program 3: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:01 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:01 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f00000100000000000000000000000000000000000000002400090000000000"], 0x1}}, 0x0) 03:44:01 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 03:44:01 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:02 executing program 5: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:02 executing program 0: syz_execute_func(&(0x7f0000000300)="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") r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x408002, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000002c0)=[0xee01]) r7 = getgid() getgroups(0x6, &(0x7f00000005c0)=[0x0, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0x0]) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) r11 = getgid() fstat(0xffffffffffffff9c, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xee01]) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000840)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x0, r2}, {0x2, 0x2, r3}, {0x2, 0x1, r4}, {0x2, 0x3, r5}], {0x4, 0x2}, [{0x8, 0xf6b2a7d8a82649cf, r6}, {0x8, 0x1, r7}, {0x8, 0x2, r8}, {0x8, 0x2, r9}, {0x8, 0x0, r10}, {0x8, 0x2, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x2) 03:44:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/88], 0x1}}, 0x0) 03:44:02 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0xf, &(0x7f0000000000)) 03:44:02 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) ftruncate(r0, 0x917b) inotify_init1(0x80000) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "1368513a186209d5f2bdf7cd33dbbee5eaa58e936d89cdaff4ffd7b3529ecd702793930344b3c3acd85063207d789650d7ba69e97ddf500641182e7bcb15802b3d0a20b70e3f305068fd92f920a686aac9add444790637bc0e9d1755bcb92b30ca6995f26dfd829b97ebcb317b96d1cee5ba9dbd8d60a9ad6cce2b160fc3b006b8fe8dd65f04de7bfae838ca19a398896d50bafdcdf4eb877632831855642ba545942234d6322b040bb227bef3a8c39954fe0963eab25c7895be69cb2887e9a9d61dd483d54a7cc6"}, 0xcc) 03:44:02 executing program 5: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2146.594926] kauditd_printk_skb: 394 callbacks suppressed [ 2146.594937] audit: type=1400 audit(2000000643.009:79070): avc: denied { map } for pid=11802 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2146.803900] audit: type=1400 audit(2000000643.009:79071): avc: denied { map } for pid=11802 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:03 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDDISABIO(r0, 0x4b37) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) 03:44:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/88], 0x1}}, 0x0) 03:44:03 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:03 executing program 5: syz_execute_func(0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2146.954300] audit: type=1400 audit(2000000643.019:79072): avc: denied { map } for pid=11800 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:03 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2147.099450] audit: type=1400 audit(2000000643.019:79073): avc: denied { map } for pid=11800 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.230168] audit: type=1400 audit(2000000642.989:79069): avc: denied { map } for pid=11801 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f00000000c0)=""/75, &(0x7f0000000140)=0x4b) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000040)="2b7494d72e1f236f0041acd029255fe241e6417704725b04ac43ebf898d48043ce8f47af928bf6e30d3ce18ba1", 0x2d) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:03 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") r0 = socket(0x9, 0x80007, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004680)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000046c0)={r1, @dev={0xac, 0x14, 0x14, 0xf}, @remote}, 0xc) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000a}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x5, 0xb, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x6}, [@typed={0x8, 0x4b, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="b6189310788b80556790463c4a708b026dcc48"]}, 0x30}, 0x1, 0x0, 0x0, 0x24000000}, 0x4080) [ 2147.454366] audit: type=1400 audit(2000000643.099:79074): avc: denied { map } for pid=11793 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/88], 0x1}}, 0x0) 03:44:04 executing program 5: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2147.640102] audit: type=1400 audit(2000000643.109:79075): avc: denied { map } for pid=11793 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.783284] audit: type=1400 audit(2000000643.209:79076): avc: denied { map } for pid=11808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2147.867100] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2147.884479] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:04 executing program 0: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0c0000001700d9ce53f26a01c1af7798b58d890ff4f86f94925a73b9ca4fc7943bf76c2646507cc7"], 0x1d) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ftruncate(r1, 0x10000) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:04 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1a) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 03:44:04 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/94], 0x1}}, 0x0) 03:44:05 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000300)) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffb000/0x1000)=nil, 0x1000}, &(0x7f0000000280)=0x10) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000001c0)=""/14, 0xfffffffffffffffe) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setns(r3, 0x40000000) syz_execute_func(&(0x7f0000000000)="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") write$apparmor_exec(r2, &(0x7f00000002c0)={'exec ', 'bde\xd6yv\x84\x7f\xff\x03\xdd\xd7H<\x8fv3c\x96\x17H\x03\x00\x00\x00\x00\xe0\xb0\x00\x00\x00\x00\x00\x00\x00'}, 0x28) 03:44:05 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x4e2, 0x1000, 0x80, 0x5, 0x0, 0x6, 0x40, 0xf, 0x3, 0x3, 0xffffffff, 0x8001, 0x8, 0x3, 0x7ff, 0x0, 0x200, 0x100, 0x6, 0x2, 0x1ff, 0x9, 0x10000, 0x7a, 0x3, 0x4, 0x1e, 0x3, 0x7, 0x7, 0x8, 0x9, 0x6, 0x40, 0x7, 0x7b9, 0x0, 0x9, 0x5, @perf_bp, 0x440, 0x0, 0x1, 0x0, 0x0, 0x0, 0xcff8}, r0, 0xd, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:05 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:05 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) lseek(r0, 0x0, 0x4) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/94], 0x1}}, 0x0) 03:44:06 executing program 0: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = socket$inet6(0xa, 0x7, 0x3d8c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x40}, 0xfffffe26) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x1, 0x4, [@remote, @local, @local, @local]}) 03:44:06 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) sched_getaffinity(r1, 0x8, &(0x7f0000000000)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:44:06 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:06 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8000, 0x0) 03:44:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/94], 0x1}}, 0x0) 03:44:07 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:07 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r0 = open(&(0x7f0000000040)='./file0\x00', 0x29ffff, 0x8) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="7486786aeca155258df40faec373f4774aa0e393457776699fd9a8bc52d2ab6c40b8ea8ff07c97be8d8c988cfd94d36990cd56d2fa9b44366fbf7777dfa6c226d36889227246ecb6090ff9b693331888a589069fd2b7a8cdc1157f783ea74f0ab68a743f59b5961cb91db5bfa8ae765aa02741113404c74a022ec3a031456d6c529c2039ef0762f7749f744dde554a025532af215bddd2ea08dcd96c638e3023b376d101978048900630aef0c5968618502f923ddcdc858d534b35f6d7764fb6ec1fe5e4d76ec146414b3b7c0d3fb943b5ac1054d7ca65ce325ebce26af2320d") 03:44:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0xffffffffffff44c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7fffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:07 executing program 4: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/97], 0x1}}, 0x0) [ 2151.603553] kauditd_printk_skb: 490 callbacks suppressed [ 2151.603563] audit: type=1400 audit(2000000648.019:79551): avc: denied { map } for pid=11992 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:08 executing program 3: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x0, 0x8, 0x0, 0x10, 0x1, 0xfffffffffffffffe, [], 0x0, 0xffffffffffffff9c, 0x9, 0x6}, 0x3c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(r0, r1, 0x80000) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0xfffffe31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xcc7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:08 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x95, 0x1, 0x0, "7e83ae6428d7ec1cdba1007f3fdd16ec", "9d4527bf97fb852e8b23f0d5d85a641b46f66376db855ce71733ebaaad2d265c15bcef08e134fd8a7198f76c5c6fc9b29d4cc2d7267c7f469c486a37912ca5aee78a75bea86d0d59b1baa389ae5a3730da1b581f6439b2c7f7548d76162505b89a83e077c8c338fe31eed62df1b22cfdd6b49800d78b6ec8e86b13fa5426ad97"}, 0x95, 0x1) syz_execute_func(&(0x7f0000000940)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ustat(0x8000000c2e, &(0x7f0000000000)) socket$inet(0x2, 0xa, 0x7) [ 2151.910108] audit: type=1400 audit(2000000648.059:79552): avc: denied { map } for pid=11983 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.120183] audit: type=1400 audit(2000000648.059:79553): avc: denied { map } for pid=11983 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2152.164229] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2152.192295] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2152.198155] audit: audit_lost=2141 audit_rate_limit=0 audit_backlog_limit=64 [ 2152.210882] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2152.221411] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2152.228241] audit: audit_lost=2142 audit_rate_limit=0 audit_backlog_limit=64 [ 2152.264334] audit: audit_lost=2143 audit_rate_limit=0 audit_backlog_limit=64 03:44:08 executing program 4: syz_execute_func(&(0x7f0000000000)="984a2ae92cb8444c0f05bf05000000c4a37bf0c5c041e2e91222e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766a9ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4f241637437f97d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0xf, 0x4cc, &(0x7f00000003c0)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000580)={r2, 0x1, 0x6, @dev={[], 0xf}}, 0x10) fcntl$setpipe(r0, 0x407, 0x6) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x3ff, 0x96, 0x3, 0x0, 0x9, 0x8804, 0x8, 0x2000400, 0x9, 0x0, 0x7, 0x2, 0x0, 0x2, 0x8001, 0x5, 0x0, 0x0, 0xffff, 0x2, 0xf81, 0x2, 0x2, 0x7, 0x5, 0x80000000, 0x8, 0x100000001, 0x100000001, 0x6, 0x3, 0xe5cd, 0x8, 0x7, 0x8000, 0x0, 0x36, 0x4, @perf_config_ext={0x8000, 0x839}, 0x1, 0x2, 0x53d76f72, 0x7, 0x1, 0x4, 0x7}, 0x0, 0x6, r0, 0xa) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0x11c) 03:44:08 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000840)={@dev={0xac, 0x14, 0x14, 0x23}, @local, @rand_addr=0x6}, 0xc) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x7d93) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xf6, 0x9, 0x7, 0x9, 0x0, 0x3, 0x3f, 0x100000001, 0x37, 0x38, 0x35, 0x3ff, 0xceb5, 0x20, 0x1, 0xfffffffffffffff9, 0x1}, [{0x7, 0x2, 0x3, 0x2, 0x5, 0x7, 0x9, 0xa1a4}, {0x7, 0x3cfc, 0x4, 0x7fffffff, 0x2, 0x7, 0x800, 0x4}], "34a95c417293914ea9543a06112ba758f4e33b3dbbafc3e34916ae8dbe03f5650cab59d7be9c40276d1f08a9c76d04b724b59d5b3b80718446515a2d976377a32c448d18303aa181229335bf215a", [[], [], [], [], []]}, 0x5c6) syz_execute_func(&(0x7f0000000000)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0xffffffffffff44c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff7fffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:09 executing program 0: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x100, 0x6, 0x1, 0x5, 0x0, 0x5, 0x50, 0x2, 0xff30, 0x5, 0x5, 0x5, 0x3, 0xffffffffffffff63, 0xdd59, 0x10000, 0x100000000, 0x6, 0x8001, 0x8, 0x4, 0xdab, 0x1, 0xff, 0x81, 0xfffffffffffffff8, 0xed8, 0xf0b, 0x1, 0x1, 0x8, 0x101, 0x5, 0x4, 0x1, 0x8001, 0x0, 0xff, 0x6, @perf_config_ext={0xcb, 0x80}, 0x20000, 0x94f, 0x1, 0x6, 0x10001, 0x6, 0x9}, r1, 0x0, r0, 0x1) 03:44:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/97], 0x1}}, 0x0) 03:44:09 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000300)="309100e149b965a78ff164327dc4655657800d492480d577b75a28463b52cfdbbdeaa61064e3a3949006e87dc2296f71534ecd6eca59109db1b1a86c8677d9c017b7bb49122147a0aefbecde0324346f2cfc5db014592141f1dfdc84f44ac7af5865f094d4babb0beb54affe88c27da68ead5ba99d53e41f3ea6b108259a78bf618c83eb33f5ddc9c662aa05136c29b7624448c921e56f67e973943fb95de4b04f39c1517d711a317968567ead722e4bb38cdba54a9e7bb618611ed0356bb9b37ccf1ec95b9b40799e331d6d000cbb", 0xcf, 0xfffffffffffffff8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x101140, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000500)=0xbf) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000080)="a34175d7ae6c15df732b973ab9ea2c17e0d46a31e21767cb1c96e569e02f310cd96ac4a36ac3ccfb4da38c2f490add267aa75a5db744262f1601", 0x149, r0) r2 = getpgrp(0xffffffffffffffff) ioprio_set$pid(0x3, r2, 0x80000001) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={{}, {0x0, 0x2710}}) 03:44:09 executing program 5: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x141000, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x8e5) 03:44:09 executing program 0: syz_execute_func(&(0x7f00000001c0)="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") r0 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x10) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) fcntl$setflags(r0, 0x2, 0x1) syz_execute_func(&(0x7f00000001c0)="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") r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400000, 0x10) write$P9_RREADDIR(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x122) fremovexattr(r0, &(0x7f0000000080)=@random={'osx.', '/dev/uinput\x00'}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/97], 0x1}}, 0x0) 03:44:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') ioctl$TIOCNOTTY(r0, 0x5422) syz_execute_func(&(0x7f0000000800)="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") ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000300)={0x2, 0xfff, 0x0, 0x0, 0x2, 0xfffffffffffffffd}) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x10001, 0x101, 0x5, 0x6, 0x0, 0x0, 0x10008, 0x1, 0xfffffffffffff9bb, 0x3ae41211, 0x0, 0x101, 0x8, 0x100000001, 0x6, 0xf46, 0xffffffffffff8000, 0x9000, 0xdd1e, 0x2, 0x1f, 0x6, 0xf498, 0xfffffffffffeffff, 0xf7, 0xc89c, 0x0, 0x8001, 0x0, 0x9, 0x2, 0x7f, 0x3b, 0x71a3, 0x1a40, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000200), 0x1}, 0x88, 0x2, 0x7ff, 0x5, 0xffffffffffffff9a, 0xfe5d, 0x2}, r1, 0x0, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x81) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000002c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x60020080}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="74b4e278e9469d0eb869a2a4839b7ae913a6efb2f794962fbb3f478e7701cbe70228ff069e2f877597d6ed67b8cad98b3bdf0f8edbb939c0c16721585807fb42e9f5a4b54fd63764a7c50e279c84efa6ec7615672634a1f9faca97c4d2045aa4d23bd9f9c003f006f1", @ANYRES16=r2, @ANYBLOB="01002706595cf27deebd7000fddbdf250e0000000800"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 03:44:10 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) accept4(0xffffffffffffffff, &(0x7f00000000c0)=@can={0x1d, 0x0}, &(0x7f0000000140)=0x80, 0x80000) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000300)={@empty, r1}, 0x14) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:10 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x40) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:12 executing program 2: syz_execute_func(&(0x7f0000000300)="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") r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$eventfd(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:12 executing program 3: syz_execute_func(&(0x7f0000000580)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff1a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa264531c46500c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/99], 0x1}}, 0x0) 03:44:12 executing program 4: syz_execute_func(&(0x7f00000001c0)="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") openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:12 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x185200, 0x54) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x11, 0x0, 0x6}}, 0x14) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2157.063774] kauditd_printk_skb: 367 callbacks suppressed [ 2157.063783] audit: type=1400 audit(2000000653.479:79883): avc: denied { map } for pid=12144 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:15 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) 03:44:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/99], 0x1}}, 0x0) [ 2164.703368] audit: type=1400 audit(2000000653.479:79884): avc: denied { map } for pid=12144 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:22 executing program 5: syz_execute_func(&(0x7f0000000000)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_setscheduler(r0, 0x3, &(0x7f0000000080)=0x81) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2178.045412] audit: type=1400 audit(2000000653.519:79885): avc: denied { map } for pid=12359 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2182.290163] audit: type=1400 audit(2000000653.519:79886): avc: denied { map } for pid=12359 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:39 executing program 0: syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000015) r2 = socket(0x9, 0x3, 0x7) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x48804) r5 = fcntl$dupfd(r2, 0x406, r2) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000300)=""/112) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:39 executing program 4: syz_execute_func(&(0x7f0000000040)="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") openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x8802, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40540, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) 03:44:51 executing program 3: syz_execute_func(&(0x7f0000000bc0)="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") r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000080)) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r0, r0, 0xd}, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="40000000cf18ec51bd3c7a9f6787b975c4f1ea243e2aa56684e030f4be173f53b8", @ANYRES16=r2, @ANYBLOB="090027bd7000fbdbdf250300000008000600d10000001000040002000000070000000400000014000100fe800000000000000000000000000017"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x7, 0x4}) syz_open_procfs(r1, &(0x7f00000000c0)='attr/keycreate\x00') [ 2195.030102] audit: type=1400 audit(2000000654.889:79887): avc: denied { map } for pid=12144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001e0001010000ca5081000000000000fe8000000000000000000000000000aa00000000000000007f000001000000000000000000000000000000000000000024000900"/99], 0x1}}, 0x0) 03:44:54 executing program 5: syz_execute_func(&(0x7f00000001c0)="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") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.current\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x880, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x5c}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x1}}], [{@obj_user={'obj_user', 0x3d, '+)wlan0!@-*userppp0['}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}]}) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x100, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000340)=0xa0000) [ 2200.385232] audit: type=1400 audit(2000000654.889:79888): avc: denied { map } for pid=12144 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2208.104453] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2217.364137] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2217.369992] audit: audit_lost=2156 audit_rate_limit=0 audit_backlog_limit=64 [ 2218.048951] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2218.066631] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2218.490817] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2218.496667] audit: audit_lost=2157 audit_rate_limit=0 audit_backlog_limit=64 [ 2220.468136] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2221.679219] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2221.926886] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2222.440190] audit: audit_lost=2158 audit_rate_limit=0 audit_backlog_limit=64 [ 2223.467422] audit: audit_lost=2159 audit_rate_limit=0 audit_backlog_limit=64 [ 2224.557981] audit: audit_lost=2160 audit_rate_limit=0 audit_backlog_limit=64 [ 2235.250309] audit: backlog limit exceeded [ 2235.938488] audit: backlog limit exceeded [ 2235.972005] audit: audit_lost=2161 audit_rate_limit=0 audit_backlog_limit=64 [ 2236.667524] audit: audit_lost=2162 audit_rate_limit=0 audit_backlog_limit=64 [ 2236.680089] audit: backlog limit exceeded [ 2236.740246] audit: audit_lost=2163 audit_rate_limit=0 audit_backlog_limit=64 [ 2236.747476] audit: backlog limit exceeded [ 2242.437416] audit: backlog limit exceeded [ 2247.090207] audit: backlog limit exceeded [ 2247.096112] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2249.070911] audit: type=1400 audit(2000000655.499:79889): avc: denied { map } for pid=12359 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2249.252182] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2249.318282] audit: backlog limit exceeded [ 2249.366314] audit: backlog limit exceeded [ 2249.549506] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2249.566677] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2249.636732] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2249.648411] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2249.654314] audit: audit_lost=2164 audit_rate_limit=0 audit_backlog_limit=64 [ 2249.685541] audit: audit_lost=2165 audit_rate_limit=0 audit_backlog_limit=64 03:45:18 executing program 4: r0 = eventfd(0x7) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/4096) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000001300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r3, 0xa08, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x18, 0x18, {0x6, @bearer=@l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x5) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) 03:45:46 executing program 2: r0 = dup(0xffffffffffffff9c) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) syz_execute_func(&(0x7f00000001c0)="984a2ae92cb8b64c0f05bf05000000c4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fdee51bc421045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:45:49 executing program 3: syz_execute_func(&(0x7f00000001c0)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x5) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10001408}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf25010000000c000400ba0e0000000000000c00080009000000000000000c000300bd00000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x4c000}, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180)=0x7, 0x4) [ 2254.102028] kauditd_printk_skb: 220 callbacks suppressed [ 2254.102037] audit: type=1400 audit(2000000750.519:80049): avc: denied { map } for pid=18058 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.365678] audit: type=1400 audit(2000000750.579:80050): avc: denied { map } for pid=18058 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.566182] audit: type=1400 audit(2000000750.619:80051): avc: denied { map } for pid=30779 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2254.649914] audit: type=1400 audit(2000000750.649:80052): avc: denied { map } for pid=18058 comm="getty" path="/etc/group" dev="sda1" ino=2218 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:45:51 executing program 4: pause() pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000300)=0x7, 0x4) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, 0x2, 0x0, 0xe, 0x20, 0x8, "d7d3ba68244fec226c0fd3d0035b8c25cf4efea0d157651ac6335b3444c4f05f840e31c1be0f94131cb1f86c7c93a2f3e38501d7c5ae802fb8c3f67742e339d3", "a76d78ec6fa0e99605c190c406a3da07b915f6644768b1f46c92cc6db242a87f7ed0922c699f53132d13be35067cce62d8d6989d026b1a31286f1480e30c2e21", "7b783ece506b55ad8419800a1837a29f809ccfd0c932abfe6157c576d892931c", [0x7, 0x83a6]}) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:45:51 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$poke(0x5, r0, &(0x7f0000000080), 0x5) r1 = syz_open_procfs(r0, &(0x7f0000000140)='smaps\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0xb264, 0x800, 0x7, 0x9, 0x0, 0x8, 0x40800, 0xa, 0x7, 0x3ff, 0x3, 0x800, 0xfffffffffffffffe, 0x9, 0x8000, 0x2, 0x1f, 0x74c6, 0x9, 0x8, 0x100000000, 0x3, 0xfff, 0x6, 0x3, 0x4, 0x80, 0x83, 0x1, 0x7, 0xfffffffffffffff9, 0xf, 0x80, 0xffffffff, 0xeaad, 0x7, 0x0, 0x1758, 0x2, @perf_config_ext={0x400, 0x9}, 0x24c0a, 0xfffffffffffffff7, 0x5, 0x7, 0x6, 0x0, 0x6}, r0, 0xe, r1, 0x8) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2254.840158] audit: type=1400 audit(2000000750.659:80053): avc: denied { map } for pid=30779 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2257.439076] audit: type=1400 audit(2000000750.679:80054): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2272.293243] audit: type=1400 audit(2000000750.699:80055): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2272.874063] audit: type=1400 audit(2000000750.739:80056): avc: denied { map } for pid=30783 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.500396] audit: type=1400 audit(2000000750.759:80058): avc: denied { map } for pid=30785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2273.593555] audit: type=1400 audit(2000000750.769:80059): avc: denied { map } for pid=30785 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2277.097152] audit: type=1400 audit(2000000750.739:80057): avc: denied { map } for pid=30779 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2278.210102] audit: type=1400 audit(2000000750.789:80060): avc: denied { map } for pid=30783 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2279.930122] audit: type=1400 audit(2000000750.789:80061): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.157608] audit: type=1400 audit(2000000750.799:80062): avc: denied { map } for pid=30783 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.210104] audit: type=1400 audit(2000000750.799:80063): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.251271] audit: type=1400 audit(2000000750.799:80064): avc: denied { map } for pid=30783 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2280.286143] audit: type=1400 audit(2000000750.819:80065): avc: denied { map } for pid=30785 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2281.260100] audit: type=1400 audit(2000000750.829:80066): avc: denied { map } for pid=30785 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2281.330102] audit: type=1400 audit(2000000750.839:80067): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2281.390097] audit: type=1400 audit(2000000750.849:80068): avc: denied { map } for pid=30783 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2281.432347] audit: type=1400 audit(2000000750.849:80069): avc: denied { map } for pid=30779 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2402.034677] kauditd_printk_skb: 40 callbacks suppressed [ 2402.034703] audit: type=1400 audit(2000000898.449:80110): avc: denied { map } for pid=30795 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.580245] audit: type=1400 audit(2000000898.449:80111): avc: denied { map } for pid=30795 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.621810] audit: type=1400 audit(2000000898.639:80112): avc: denied { map } for pid=30786 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.646255] audit: type=1400 audit(2000000898.639:80113): avc: denied { map } for pid=30786 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.078769] audit: type=1400 audit(2000000899.159:80114): avc: denied { map } for pid=30795 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2406.103243] audit: type=1400 audit(2000000899.159:80115): avc: denied { map } for pid=30795 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2438.027700] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x1 nice=0 stuck for 147s! [ 2438.036371] Showing busy workqueues and worker pools: [ 2438.041691] workqueue events: flags=0x0 [ 2438.045835] pwq 2: cpus=1 node=0 flags=0x1 nice=0 active=8/256 [ 2438.052177] in-flight: 9552:key_garbage_collector [ 2438.057563] pending: free_user_ns, free_user_ns, free_user_ns, free_user_ns, free_user_ns, free_user_ns, free_user_ns [ 2438.068839] pwq 0: cpus=0 node=0 flags=0x1 nice=0 active=5/256 [ 2438.075001] in-flight: 25693:linkwatch_event [ 2438.079846] pending: wait_rcu_exp_gp, vmstat_shepherd, vmpressure_work_fn, free_obj_work [ 2438.088667] workqueue events_unbound: flags=0x2 [ 2438.093494] pwq 4: cpus=0-1 flags=0x4 nice=0 active=5/512 [ 2438.100470] in-flight: 27489:call_usermodehelper_exec_work, 11882:call_usermodehelper_exec_work, 11876:call_usermodehelper_exec_work, 27496:call_usermodehelper_exec_work, 11870:call_usermodehelper_exec_work [ 2438.119398] [ 2438.119403] ====================================================== [ 2438.119405] WARNING: possible circular locking dependency detected [ 2438.119407] 4.14.115+ #64 Not tainted [ 2438.119410] ------------------------------------------------------ [ 2438.119412] ksoftirqd/0/7 is trying to acquire lock: [ 2438.119414] (console_owner){-.-.}, at: [<00000000c6550117>] console_unlock+0x28e/0xc60 [ 2438.119444] [ 2438.119446] but task is already holding lock: [ 2438.119448] (&pool->lock/1){..-.}, at: [<00000000974931dc>] show_workqueue_state.cold+0x22f/0xe95 [ 2438.119456] [ 2438.119459] which lock already depends on the new lock. [ 2438.119460] [ 2438.119461] [ 2438.119464] the existing dependency chain (in reverse order) is: [ 2438.119465] [ 2438.119467] -> #3 (&pool->lock/1){..-.}: [ 2438.119474] [ 2438.119475] -> #2 (&(&port->lock)->rlock){-.-.}: [ 2438.119481] [ 2438.119482] -> #1 (&port_lock_key){-.-.}: [ 2438.119487] [ 2438.119488] -> #0 (console_owner){-.-.}: [ 2438.119495] [ 2438.119497] other info that might help us debug this: [ 2438.119498] [ 2438.119500] Chain exists of: [ 2438.119501] console_owner --> &(&port->lock)->rlock --> &pool->lock/1 [ 2438.119511] [ 2438.119514] Possible unsafe locking scenario: [ 2438.119515] [ 2438.119517] CPU0 CPU1 [ 2438.119519] ---- ---- [ 2438.119520] lock(&pool->lock/1); [ 2438.119526] lock(&(&port->lock)->rlock); [ 2438.119532] lock(&pool->lock/1); [ 2438.119537] lock(console_owner); [ 2438.119541] [ 2438.119543] *** DEADLOCK *** [ 2438.119544] [ 2438.119546] 4 locks held by ksoftirqd/0/7: [ 2438.119548] #0: (kernel/workqueue.c:5442){+.-.}, at: [<00000000cd788502>] call_timer_fn+0xc6/0x680 [ 2438.119556] #1: (rcu_read_lock_sched){....}, at: [<00000000fea3d0f3>] show_workqueue_state+0x0/0x100 [ 2438.119564] #2: (&pool->lock/1){..-.}, at: [<00000000974931dc>] show_workqueue_state.cold+0x22f/0xe95 [ 2438.119573] #3: (console_lock){+.+.}, at: [<00000000822bac7b>] vprintk_emit+0x11a/0x330 [ 2438.119581] [ 2438.119583] stack backtrace: [ 2438.119585] CPU: 0 PID: 7 Comm: ksoftirqd/0 Not tainted 4.14.115+ #64 [ 2438.119587] Call Trace: [ 2438.119588] dump_stack+0xb9/0x10e [ 2438.119590] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 2438.119592] ? __lock_acquire+0x2d83/0x3fa0 [ 2438.119594] ? trace_hardirqs_on+0x10/0x10 [ 2438.119596] ? scnprintf+0x130/0x130 [ 2438.119598] ? lock_acquire+0x10f/0x380 [ 2438.119600] ? console_unlock+0x28e/0xc60 [ 2438.119602] ? console_unlock+0x2f6/0xc60 [ 2438.119604] ? console_unlock+0x28e/0xc60 [ 2438.119606] ? vprintk_emit+0x128/0x330 [ 2438.119608] ? vprintk_func+0x58/0x152 [ 2438.119610] ? printk+0xba/0xed [ 2438.119612] ? printk+0xba/0xed [ 2438.119614] ? show_regs_print_info+0x5b/0x5b [ 2438.119616] ? lock_acquire+0x10f/0x380 [ 2438.119618] ? show_workqueue_state.cold+0x22f/0xe95 [ 2438.119621] ? show_workqueue_state.cold+0x34f/0xe95 [ 2438.119623] ? print_worker_info+0x290/0x290 [ 2438.119625] ? check_preemption_disabled+0x35/0x1f0 [ 2438.119627] ? wq_watchdog_timer_fn+0x400/0x480 [ 2438.119630] ? show_workqueue_state+0x100/0x100 [ 2438.119632] ? lock_acquire+0x10f/0x380 [ 2438.119634] ? show_workqueue_state+0x100/0x100 [ 2438.119636] ? show_workqueue_state+0x100/0x100 [ 2438.119638] ? call_timer_fn+0x14a/0x680 [ 2438.119641] ? collect_expired_timers+0x280/0x280 [ 2438.119643] ? _raw_spin_unlock_irq+0x24/0x50 [ 2438.119645] ? show_workqueue_state+0x100/0x100 [ 2438.119647] ? expire_timers+0x216/0x4b0 [ 2438.119649] ? run_timer_softirq+0x3e3/0x5d0 [ 2438.119652] ? __schedule+0x924/0x1f30 [ 2438.119654] ? expire_timers+0x4b0/0x4b0 [ 2438.119656] ? __sched_text_start+0x8/0x8 [ 2438.119658] ? __do_softirq+0x234/0x9ca [ 2438.119660] ? ___preempt_schedule+0x16/0x18 [ 2438.119662] ? __local_bh_enable_ip+0xc0/0xc0 [ 2438.119664] ? run_ksoftirqd+0x2d/0xe0 [ 2438.119666] ? smpboot_thread_fn+0x5ca/0x900 [ 2438.119669] ? sort_range+0x30/0x30 [ 2438.119671] ? sort_range+0x30/0x30 [ 2438.119672] ? kthread+0x310/0x420 [ 2438.119675] ? kthread_create_on_node+0xf0/0xf0 [ 2438.119677] ? ret_from_fork+0x3a/0x50 [ 2438.508955] workqueue events_power_efficient: flags=0x80 [ 2438.514418] pwq 0: cpus=0 node=0 flags=0x1 nice=0 active=1/256 [ 2438.520613] pending: neigh_periodic_work [ 2438.525079] workqueue mm_percpu_wq: flags=0x8 [ 2438.529564] pwq 0: cpus=0 node=0 flags=0x1 nice=0 active=2/256 MAYDAY [ 2438.536323] pending: vmstat_update, drain_local_pages_wq BAR(31183) [ 2438.543156] workqueue netns: flags=0xe000a [ 2438.547380] pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/1 [ 2438.552933] in-flight: 32291:cleanup_net [ 2438.557450] workqueue ipv6_addrconf: flags=0x40008 [ 2438.562402] pwq 0: cpus=0 node=0 flags=0x1 nice=0 active=1/1 [ 2438.568378] in-flight: 73(RESCUER):addrconf_verify_work [ 2438.574171] pool 0: cpus=0 node=0 flags=0x1 nice=0 hung=148s workers=2 manager: 22 [ 2438.581903] pool 2: cpus=1 node=0 flags=0x1 nice=0 hung=0s workers=4 manager: 30773 idle: 29580 8077 [ 2438.591246] pool 4: cpus=0-1 flags=0x4 nice=0 hung=29s workers=12 idle: 11874 27446 27469 9561 9510 32323 [ 2441.260861] INFO: task kworker/0:0:25693 blocked for more than 140 seconds. [ 2441.267988] Not tainted 4.14.115+ #64 [ 2442.554594] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2442.888307] kworker/0:0 D28672 25693 2 0x80000000 [ 2442.894066] Workqueue: events linkwatch_event [ 2442.898594] Call Trace: [ 2442.901222] ? __schedule+0x91c/0x1f30 [ 2445.304236] ? __sched_text_start+0x8/0x8 [ 2445.308471] ? lock_downgrade+0x5d0/0x5d0 [ 2445.312667] ? lock_acquire+0x10f/0x380 [ 2445.316677] ? __mutex_lock+0x2c1/0x1430 [ 2445.320795] schedule+0x92/0x1c0 [ 2445.324207] schedule_preempt_disabled+0x13/0x20 [ 2445.328992] __mutex_lock+0x559/0x1430 [ 2445.332924] ? trace_hardirqs_on+0x10/0x10 [ 2447.353196] ? lock_acquire+0x10f/0x380 [ 2447.361821] ? linkwatch_event+0xa/0x50 [ 2447.370414] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 2447.382072] ? debug_object_deactivate+0x1e4/0x360 [ 2447.392946] ? lock_acquire+0x10f/0x380 [ 2447.401543] ? linkwatch_event+0xa/0x50 [ 2447.521753] linkwatch_event+0xa/0x50