0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getuid() r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x5, 0xe, 0x0, "3e556471e180a7f2ae9d91edfe35480a9e4068f2b686ef20f063c18f0d78581c360b5990420faa2413585e558da7a75b8b716ef8ae67200e239042f8890d0650", "747b5cf59a17720d876915d34924a851ad2596daa840c7d4240ae4ede054d7283c88ed86247ca654e5c4f6bc693da55237ed64d7d96fdb791612b0ed7f89d3dc", "bd4bcf4ba781066b833ce0f521125a2c62c48455640ced171e0ce9053a99a1af", [0x8, 0x4]}) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r7, 0x10, &(0x7f00000001c0)={0xd10}) close(r1) 03:41:29 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) read(r4, &(0x7f0000000340)=""/231, 0xe7) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000000)=0x1) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:29 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote, 0x3}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:29 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:29 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0xfffffffe, @loopback}}, {{0xa, 0x0, 0x2, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = accept$inet(r1, 0x0, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0xe574314e67beb450, &(0x7f0000000380)={0x3, {{0xa, 0x4e24, 0x3, @empty, 0x4}}, {{0xa, 0x4e22, 0x3, @local, 0x9}}}, 0x108) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r5, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan1\x00', r5}) close(r0) 03:41:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") socket(0x80000000000000a, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(r3, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x7f, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x50, 0x0, 0xfffffffe}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_int(r4, 0x29, 0x12, &(0x7f0000000000)=0xffffffff, 0x4) r5 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "b8e90e781aca5832", "c86ec8062c9c8399fc4a2b41f6b51c7a", "52bf7aa5", "ca833d370289087b"}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x24000) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000180)) io_setup(0x1, &(0x7f0000000340)=0x0) io_submit(r7, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000002c0)) 03:41:30 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x8, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote, 0xfffffffc}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000000)=""/69) 03:41:30 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r3}}, {@uid_lt={'uid<', r4}}, {@smackfstransmute={'smackfstransmute'}}]}) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r5}}, {@uid_lt={'uid<', r6}}, {@smackfstransmute={'smackfstransmute'}}]}) r7 = geteuid() r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) r11 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f0000000640)=0xe8) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r13) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x1}, [{0x2, 0x0, r2}, {0x2, 0x1, r4}, {0x2, 0x1, r5}, {0x2, 0x2, r7}, {0x2, 0x7, r10}, {0x2, 0x5, r11}, {0x2, 0x1, r12}], {}, [{0x8, 0x4, r13}], {}, {0x20, 0x4}}, 0x64, 0x3) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r14 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r14, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r14, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:30 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:30 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x98a400, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000500)=0xe8) r6 = getegid() write$FUSE_ENTRY(r2, &(0x7f0000000540)={0x90, 0x0, 0x4, {0x6, 0x1, 0x7, 0x4, 0x80000000, 0x4, {0x0, 0x4, 0x0, 0x101, 0x1, 0x3, 0x3, 0x6c5, 0x3882, 0x4, 0x8b, r5, r6, 0x400, 0x8}}}, 0x90) close(r0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x1e) r8 = syz_open_procfs(r7, &(0x7f0000000000)='statm\x00') sendmsg$nl_route(r8, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@getaddr={0x14, 0x16, 0x100, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 03:41:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sysinfo(&(0x7f0000000000)=""/125) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:31 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000340)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(r2, 0xf150738013105871, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) fcntl$setpipe(r0, 0x407, 0x4) 03:41:32 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") get_thread_area(&(0x7f0000000000)={0x3f, 0xffffffffdfffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x2, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote, 0x8}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:32 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) bind(r2, &(0x7f0000000340)=@caif, 0x80) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000040)={0xfffffeff, 0x2, 0x7, 0x81, 0x1, "fa9eac7a9506da6bfcce8773aa7a8d7d089add", 0x5, 0x7fff}) close(r0) 03:41:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) memfd_create(&(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self\x00', 0x20000, 0x0) r5 = fcntl$dupfd(r4, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$selinux_attr(r2, &(0x7f00000001c0)='system_u:object_r:sound_device_t:s0\x00', 0x24) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r5) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r6 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:32 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000019c0)=0xe8) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r6}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r6, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg(r0, &(0x7f0000004c00)=[{{&(0x7f0000000400)=@pptp={0x18, 0x2, {0x2, @multicast2}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000040)="540eb76cb59f575d01d2bf7b", 0xc}, {&(0x7f00000001c0)="9ea623d14b0afed9591bd3398319ab40ae09ec07d82679c1f33f431483a69232358cda239f1113063550f93d30ad5f925000574907", 0x35}, {&(0x7f0000000480)="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", 0x1000}], 0x3, &(0x7f00000014c0)=[{0xe0, 0x45, 0x2a47, "efb8e2b08672f06c7d83916ba1730bfeb88bdb1d25dcf4933323b18181f0d14f7ce35fbd384b70a1912f956f05a594993c36be8de47920e0fbdbb245eafd024a9a725da6a80b4014579f3a5b2b6dbc71046c733d62b28e433d846525810b4bbb74340b7eea477f6b6466a8a3b6d97e2a334842e64be6e66b0469264b36814b2088fcda7d2798cf6cefc00b2cd35c45a9f848af101dd6e7a66997cfb09be4bc6693ffaa4d7b039cfe1dd3e2a0ae81d3100c66843e30b7b0c03144246a1119dc6dc8431f53870d29090021bb0834fe9c"}, {0xc0, 0x1c, 0x2, "05cf660292cf336fe4e884ec040fab8af69f96de6cd023ad757965f2c0158fbc0e1380e2ed89ae97dbb43bcb35f03badd6fbc19ef3763290ee0029a212ccd8c73053a7004865f6a072b4f6251a9e10995f40248f8199a28c64853a11f2bcb5fa1a2628f4dabe8b2708f615887df71ee8285283f7474362d99bd1284966ec868ebc412902ae831a7bb9d44b36698b8f4d15e7d2d90edb0b1cf48d83a43a47425c769970939ef5fbe74a95d81a"}], 0x1a0}}, {{&(0x7f0000001a00)=@hci={0x1f, r3, 0x2}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a80)="16fe", 0x2}, {&(0x7f0000001ac0)="373bc8cb926225299b204cb7f0a3d18b7b9a5273260e2946dd88c601ace9b412efa4d17fb7e3aa75a9b65cc5b7afb4ba24deeed092f0d26de46863d170635bfecc83b01262af2de17d2514e726a3b13321e52a20c038490c308e59c7fe93dc42a8c8eb284488ff4a4c6589800e6c59ff4393d3b1d99125c6874901ba73123b358128d74ee398de8cc7f0bd8b4ebbbb143a4205b02a65d5", 0x97}], 0x2, &(0x7f0000001bc0)=[{0xf0, 0x10b, 0xfffffe01, "de1d1dce49ad0cb291e497646527054f06a3c9766e0fd1aea70b4d1553133ecb49fa13a3f5c0ff3a90cc4807bc7bdfc236f24fd7a42e573ec0a2c4ce53a09ae2f0181db735cee4fe4240b717085f38469069bec3b9c7f3634356ef48dd9799a714b6fe868fbb2e89a8baeaedb43a0d31733669ceaa3f587c6e233b2bcf360584ab23620e0b2a4de57933134770063c074dd0e1a9acd2681d54afadfd0ac0502689c9ab206dd3e2203cb00046f06bc042bcce49e2f701926db364e0a17a38e651d68c6ca5f84b4803170bfab13802896e79b08192eeed7fe8e22c9928de0ed8"}, {0x40, 0xff, 0x1, "9fea82ca04da70ca7b1ff96bc852aa756e9770bd88b2882d4b303f271c1a5a183a63510736aa0b147fc0"}, {0x28, 0x100, 0x6, "1fd3780d2d59ae5d4030efdc0029f643b245a5"}, {0x48, 0xd4dac3c27c6aff8, 0xa0000000, "44678c947342ec0b500920a37c8fc8fa6756efbe1ed19a5f49ee00eef18b41b7f186661b4571a6c441292257a2367dccde49bd780785"}, {0xc0, 0x110, 0x2, "36078593e4d999dc9564d6d310272379cde8406efd80866ff2de7d73f24419ff707d439f2ac27e633fecffa843f73d10b8b344decbc11eca587a587779ccd85291e9dddd1a01d39ad21de84eb654c788612c2f5f526d52e1ff5bf3bbdc7a691cadff18300c46499ea23a0dc11b69bacfe04519be44c533a7bf059bad50fde57932bbedf09006200e7985cb5a98b831f6d2bfb8bca5f73ebbf85d03e0268c968f35f5587a09418636014ffb"}], 0x260}}, {{&(0x7f0000001e40)=@ll={0x11, 0x2, r6, 0x1, 0x7}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)="2030c9c0a66356a8d826cff02b000879e6e92e1a2785fe9b3051d6d927e733b806ceab7f1611d56126ab9bf1638d8d06252ca847a433a76d98a33760209bc4dcc2956f62902fc447a8380a8403027d8641a8af9926907516cea9c609293262107dcd91ec0c56f5c4bba4482209c3ebefef9a24a0b5174b3d0ed7112600aa6fa9493f85fe294dd784aefc8c1bfd0e7203a29fda4a40333ee3d8800f95c1ba3b093afe9159fe5fd1d97803c9a1928c9abad84e1666a188ea7175c26996ff140a114ab3c73a8b143787ae1e6c0687ea0914b0bca815650abddb5602c99c007484aaf0bbfff5f28a9c47", 0xe8}], 0x1, &(0x7f0000002000)=[{0x70, 0x1, 0x80000000, "7ad7eb648647cb8cd4c47fae47c6adbf5af47c98ae3b1ae79bf128ac344fffe0642458084cd22f2d97cadc9c572cfcd8d9e0d25c9edbced4bf2ad0499bf5cbc62c587876181b3f4a9a05d9db511d259253e6323b5b8b3e85bf85393d"}], 0x70}}, {{0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000002080)="e76413898dafab3fed21d2288f64f3685927348805363485e69a427c617a5dc903c04c4afb5bf8c97d5933d1872e37f29e6084bd5007f3523b7ef614c0a615946cdbd65d1d4cb72324b51cf4da274ab3620c544a913b4fd14a74f96f57bb4993924767ee65ad2b61ac8e579b68b6c59f4d9d", 0x72}, {&(0x7f0000002100)="1aec6936cc4ac35e5fcd0893fa7193e77f6e7c4be29bcc23b0542abf0844d5c3cd0b6dc0fc2cf7a8477a4685e49212af810f2c2c109884606f36086fa5114ab6579d3cd4b3bd58862bab564496e377fd55af73b13250c1d47f2ce489ac298456e9e8c2cf30477787303c99ba34afc8815a3511f1e22e3a", 0x77}, {&(0x7f0000002180)="431423591eee613c795073ea808ea2ee3514458ef71d26a6f04ef9e48b5daa03be41d88f14920695956e084957272a95443e334e1bbbbe3d023066b05451c3a10965f423d9d802812472c5fe6679f5c7da29fe8120812cc989c19e0f26d9074f4d9ff1dfd8daa38d60d2bedcad69f0f6f47a6c3587ada2b91d6236804f651b76eedcb5512bd9559dc5854c436fe7a6c59cb0749d277721642cee35f6979ae30ec994aef77f05eb220e579622cf0b0688d43a54c9fe10cc080afe19fb8cc882c07d1027761fac", 0xc6}], 0x3, &(0x7f00000022c0)=[{0xd8, 0x13f, 0xfffffffe, "985a7eb0d62fad26ac9d0900d9a3c1c523d213cf9e3f9ace8019d846d108bf51685796b672b2a89b6a24aac325bb2797399840e9976acec380a9dfb918cf9d8349e36cc1cf5bc68dabbf4129d17131c534462f000a67a0dc0f1cf07ae90d4bcc5b7c1a7d1c19807e0f622373085affc3e223f8cddcf9168489bfa641b102c6e9a51150717936b2b27a6c8785e37b82a5e66b125c584f1baff43bbde127a0b7a5b3e2cac3e579ae29004d86d21e1a1fb91ecb9d1e9864fd3532ed2e6a749faae549b63eb0777a"}, {0xa0, 0x88, 0x6, "fcf655baebe18f9f5b3a609e537ff8885247121652c57715dbccd8ca06ec9b2e19d633703296ee0d1c404131d81d4ed29c315e166dc434dd044def8f514eb793bb0ad3da9537f1fb6f6b146d99a0eebccc198e1524232de0309be772fd1857d6c8c7ccbee157b9e5217c47fffa6ee5f0bfc3eb3fdc00b13a7efe8e2cc901ed441d6399a65807f01101a8"}, {0xd8, 0x16, 0x1, "303cd99cfec360ed58cde94371c6e602f03ea47ca7e64c32fffcab7403bc5430bb0f41c60c731c1a5183cbfc0d95a7a197826acbb0fafae4580668f904a66ccc4a6ed202d84f07f690df1d1f98c064f9c1627e55b31af8f3353dba0c22bd8dfd176c8543e5b8591de1049f21f4edec49355817164cfdf37d018a0048ed6ebe00f20816a2ef30699d5053300a15bf9cd021a73315843da46d200d13e66d804027aa1cbbb3e3ef6ffde7e871869ec293a715ea01f00c3c741f6cb29c7a854eda0c25"}, {0x58, 0x1, 0x1, "9aacc530e7fbe03ae91d980309adb781cd9db502261d7fbb9104fa47909947c3cd3ac8547eb48d1a0282cdae66c54b508b15ab34931c697dd6482e4b2c58d19c4e899369"}, {0x18, 0x113, 0x3, "81835b5e50d1b3"}], 0x2c0}}, {{&(0x7f0000002580)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3, 0x3, 0x3}}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002600)="376cb1f6b3add7bde37e27b679b3aa75e804c13690e540e32c3c9dd2e156e063c76ae004613d8f6577c6082be93009681ef4e7b888500595d07487533aa05dc178df72e2065c3481100c45b714e403b9d66f1a6b8e6eb84e8384011e49ab3c37f165e02cefa1ead2dd371a7a50785d4f2b2f74111cdf48608b6bbea028700aba2100a9b75b8bc8af4b139924d7f23d2ca682f88cc58926ec96e94e6433e463012f5e0382aadcfac1440c34bb393514056470c266664958f81c2f08f2189f50542c", 0xc1}, {&(0x7f0000002700)="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", 0xfc}, {&(0x7f0000002800)="643cc6386553ad050164d485c9875d5c581b8989be2aba5861dcc556f685bb64fc454b7a611bb24780d04c8221115f7205f0b19dc36a88be3e147f33a374ed4f189efa4f6b3fb27de8f54bc7973884230fce73526d31747705aaea5bb0a6b19bea46635461e6f4f392e15acea3647366219ab6b28fea7ee3ebe4aef44368d0316cbb2fc1c55aa4f1eb48b04d4317c75eb3b89fb9feb3d794f9d08bc4105e0249aa75515044b78c73385f3697ef2b5c09820a951cc56690441cb59c0f4e7638c326d1f216fff9f52f817c0cad828dcbcebac34066788c2c8d21fc02e4eb101fbae26a6981e0be8d4c920d867a082cd398caa1efb1fa81", 0xf6}, {&(0x7f0000002900)="25f75ecc29810dee1575a832baf7e6f0580d664b04b25d12448526c4d0124d2e716f8ea7ca3015b8e4e338d4d2c3df2f531af2fc787d4729866b38104b69177a65334db28015e11ce1ea73e2cf9f44f774288598143654b561f6f26b9a48a59588469ff3654d816c76b865043fdddd2e984adc1639644f6e36084eb9d2583671b0c1ce7961d6e89cfbe4147ee954ab968bcc1f88937d1c81e80f972da4e2dc7e02832deb9ae6f633dc131cd3bca5a5501cc104540b7685bb32e441e3b434c9477f2caeb66303c7f404e6c0a073c4ef133f29b20a0c082e31a4", 0xd9}], 0x4, &(0x7f0000002a40)=[{0xb8, 0x10f, 0x4, "1b456062d9d0132e23d4f4353e07e63475cba3e69d7d39d8b514ad15db1ef9ed043a19a46bbc829884ac03b58bee15719f9ca795365342ea35bba64a61362499e2ec9dcafdb76ef151e4a03b7ea63e4ab8b395816950eb62f086d8ab29b4b17e8bfd695ad0dae3d1a03ff7ee937f896cf2366d4f4e6f7ff40e94fec2e40a9a907b9a5b46199f4a0a690d0f2650c1a69cf5ff7790bf973fbaf4ee4061d19d6194bab1"}, {0xd0, 0x12d, 0xb5cb9172, "16bf709376e295ba7b377ad6e021cad2cac91a656fbef5c4a72e804e4733aa4f3b7872aa06a661cc1f874527d8a8c6aaa14ed0132aca2561abb776aa1f56afd4c1336c1bda3d75e960656e573cf5e38cf95c279b5403988142d54313396ecae3b9e8e4533887b25b85c50f5b7210b5990f4c04d872e4a0038320ff8035b0d9383593fa7aee4f15e764b69ba08a65d5bef7e33d34162ff1e7d948642af68ad96af435cfb15a3988a8b43994530eb6e3f8e86b8e047ec27f536d3df7eb7eadb309"}, {0xb0, 0x118, 0x8, "6828463560d70174e00274421ddf16a25e2c5867cebc79f8b4da57657a8a802ed449539fc793d4e6ebb9df19c7e700f2c1b5d383943e3a0ae664f4b9f1bdc3c07b771e4b9f07e99b5885c9cb98f7b06ea3151f86b753196abc7fb2f12a6c7c0d33c02c2562439a178eac0f561497d56d40187f0e1a776c70c731e912672046bf3660ffcbed3ba1e1bcff98f6be5df9f793123a1974e60f2647c181"}, {0xf8, 0x1b9, 0x400, "40c7a9c48f3b5735c5bd0368dc39d9a5ea43c1724425c31961e79d06821c80b990614ea098ceaee4a27b6fe219dfd20d2d3aab3dfa09b9fd3fe86b0db9416dfd73572031d1488e980d9580692377af838d87e163a8014638b5ccb5971085120d3a88309f7b89209693a8bf423998db00cbb46d5ce4c6591fa01a33338095af323e15af3e9a3f01b819ac91146e909752e4694d9290b655347e32f879e37d25e3f33010cae79e3fad9ce75d3d90645c14910cb4bdb56990206028910c41588d206cf49df3586bdf5632da79604a70ebce483fd7ad325814d7ab4f4fa006c5eab5b9ee3e3d08"}, {0x88, 0x103, 0x8d3, "ce733405ec3faf2a8cb77f770fdea315adf033632ffa5f176943962a8a626c86ee816d56e6f98395d02d32029b845c61eee0c9f4fa854dcd027844f806e11efeb98b957b5aa840c917c4e5b26014e2714ee5acc5ed73e5243ca4946c9df3c382b2924287e19ee5126ef34ec47b33a38d07171382"}], 0x3b8}}, {{&(0x7f0000002e00)=@llc={0x1a, 0x11d, 0x0, 0x8, 0x2, 0x2, @random="6c083d636cd2"}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002e80)="e924a7b110d6ede30590dc55cb3f44c01e348a54681b521c077f5c5957ff487541227cead17fad4372b6f0390c2483260a181502e872bb", 0x37}, {&(0x7f0000002ec0)="403df0931ffeb43d1d9458791157ecc10af5aa30c6964ee291b4445af782ad7534655d88a899749e53973eff7a2562a83889eef9eb5805a96ca93ea8aae38cebd7d5d91696a7c912eec3789aabc2", 0x4e}, {&(0x7f0000002f40)="9e6e8f87cd526a4ac7ba3f9922e14392c1edabb62f9b660acd9a6f0355ffd9b110f3a40a616ace888b990e1c26f5738b7007c56bac923122150662d751ddba6c4742ce9abca75be87a4b2d2769667665004c3dd79c9b6369b7c9bf67dffdd81276c189b334eb93eab2f6b44438aef0f56dd96da0ba7135c17d85cfda06b1ba8c043b068316457fa411d4888670718c7140fdcd867d76eae92264ee2d5f578fb0fbd4e01fdf08eae1bf236a5bae", 0xad}, {&(0x7f0000003000)="4c1dd37da3c6254c48837e21ee2123fe7fd82f94d81761ce3203e911643c560e9c8661", 0x23}, {&(0x7f0000003040)="80da0b98c27fdb76de86fe4dfbc856365bfc9027a3", 0x15}], 0x5, &(0x7f0000003100)=[{0x50, 0x110, 0x7, "79eb9736ca508088cb2d44f6edd9a48b4e0ee9857a0a9fa75ad1c6a45e78a2baeacd80294edbcf82cfca8036ba2aaddb3eb0c8203deb73a82545"}, {0x30, 0x118, 0x8, "faca0a207ca46bf4650ca99b66ab30ec3abd63a8eeb498b5943f3d2c16ac"}, {0x1010, 0xff, 0x80, "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"}, {0xe0, 0x72abca72a1c582c6, 0x8001, "c348e48d61aa267fbe0e4f5d2baab8671df9b68563a6d3572a8070b6a49c1494c19a766df9b0e82941c812a9f7619557dd4fd42bbd20b40c41234ef8db83d8db658d25ae9fd1965f226a744ef849d68ab15859cf365b2f71301a2f12226deef3f98d3a8810487c179b5f00ce407a7d1a54f2af6583df9e41e3908f99264533be98e9dbad5ecb13dda27b0271bf0184439479d18a2856e32f126c4c2dc130b3a483f87e8f0b545994b8c95da408453f4cf60017d01fc824adc6201e6705ee9eb31e4857f59c7307f2222d5411a4"}, {0x58, 0x112, 0x1, "352a2db92e3384248925dfd9c54a6c06dbd47171e68fcea5e5ecbeb7ba089f0e987383067d11fc7a6b999d2d48e5fd4263c0a77d6d55e1bc5ecf2ed7ee1d045c284d"}, {0xe0, 0x116, 0x2, "a81d884ac6c7292fcce74ea986968c393cf3a957ba54c672f7d49e30ebcf5aef4bf21c4fde27bcce3c6bcb5037570a12e12bfce8b83872d4d77b30cd8c8fac7b3c2497b3aeb36747c62ede26728b20f901db87f27d8e2cbb59d23c7ae78da1cf5a5dabb4cb6f051bc6333a36fb6067cc3d4374268954959e072ddf8813982abad51cae10f810334c5262e976f7205e16a71f7ca6fcfa419a872ac012e920657a7f719902a60d7786a6789395abffcee52173d02e4199eed44719584c65f7b9e47b849c285b670c49a38545d5"}, {0x28, 0x114, 0x101, "e81873844bbc67c38504d1a09a9def209c36501d43d45c"}], 0x12d0}}, {{&(0x7f0000004400)=@isdn={0x22, 0x20, 0x0, 0xba, 0x8}, 0x80, &(0x7f0000004780)=[{&(0x7f0000004480)="972436a940b33329db1cce29945a3a05bd555098c2f2ea0298da8dddb597a1cbf63f8064930053dca691ddf399137f3b98738b527ba6c787d0ff813398ea854632dfe2f8eedd2e231dec634372e80d018ef3b1c3b03445a1d6b3bb6894583661cc8d7a11b7f5eebdfef7490b169c8985156c0fd9d448f3c9e396510469396bf2f9f0314c1f411240456ebf50dc6f845be726ef9b94425cfb0fda01a8da67dcd0cbfd5f10db", 0xa5}, {&(0x7f0000004540)="10acebac512d94db7b43ec86aed0bd9c6094489d9ce0dec8430cd168cb3ac8b3390bd338e95886f181ee14297233586e0b202e57bf7a4bd338e24d287f67babc56258bd4033c8c2c51b9f24ce87d71a603be3d5ee516f6f1d57a9188951f3744ea3072b56d02b6ab6ae1913d841424a50f6beb740f8019f2bfc6f55f313675f17fa9d707494e35ce14dc3cc3c854a8d049fc729a5268425629b578e87a", 0x9d}, {&(0x7f0000004600)="a2d52db6289cd252ef50672cbfb6075eef043a0dc90874463e819d097d05fab898aa51eb5363b226adbfa9caf0dfb2bcfa6ac39a426da69c664168f7920cbbc7a05fc61e90f9e6e62e1d88e4fad3a95a07744de6c367907d5cc2ade218226f1755e2177c8f6708ac2a28a813db4aeb526344e721a7b2956118bfb8121003665ba38e74d0b1350a989e5fbbe260dc6e14059cf44a2f0ab79d99a06bbb266c75f2f536e04141dfe0c553a97c50cf8dde4062cfb9207f030a714dc48a218d816c46ed1d1789c3dccfda6c5917b9e3", 0xcd}, {&(0x7f0000004700)="e76f754743e1f4996b3bbf0dcc947c3c8e27de6fbfcbe8dd77c49896f9ce25968eb5faf44b1daa524d59d197071a46c251b0e12dd891a141266f156df105843bba33b90a8dfa41697726f9a7e0f3dfe37abe2ece67040e329c8e195ffb6807929225880683f42fa9662d233dca43bc584dd75e5caec2a93f0ff293e49d5a938c", 0x80}], 0x4, &(0x7f00000047c0)=[{0xd8, 0x114, 0x4, "29f7c7466bb7c0ced0691e710e855e165ec345ca104aabd4c6c9d539a5396009ca08ea4aad50fdbd3138aace27998c5b04cc4af1f492de0a1c270389cfacdb24731db483c5edd0b9b3659ec3893cfffd826784cdf7debba81eb0abc2b2b95735062aefed4d7c0a4d14de86b53a4b38f24b1dcddb36bbb36aa2a413e73ec2e3f4abaf658cbba75ea0cad375887f6531412503875dbc7f9dea0a9f20bfc5ed17fdb48a7cbb198afd30d74afc0b3fa5b91579c149808f0ec643cf8376bcb8f8ab8c2849"}, {0x60, 0x3a, 0x3, "08637dbc0499ef4e66323e4f81f6cef991ee4a95715a873c692dd155b8c34386a3f1ec9173140554c071b0c4f019d3f588da0daddc273561f5d8bbfbdb682f682d3dd52ec988e7cc8078"}, {0x28, 0x111, 0x94, "5cef1cfb9d0e87ed7694e26f2a3fbb8602550d48936b"}, {0xc0, 0x85, 0x3, "b81322d7f002552112b3a7aecdcd2429d0abb0384a31c260706b55226c9abd66e5736d22b0cadbd36bc695a221598e34d46f24bce275f7456e4d5b3b58a6c15b50066ce8743b4373a22122c062c0b5028105d66957676c16f43a8b9eb618f8bd3dfec17dcad0f2ca3b15bca4dcf5ec4c743a0a013b4998c09561333b82bfaf669718d2a313aaefd0d471dba7b8a930dee1752d0801dd11e709163012384127172dd5f109385e6e9291"}, {0x88, 0x6, 0x7, "ef000a109d583bf807d73566b635ed4a4265323f420bf5cc133118e2691b0066b63d44df5561d51dc80dad03a5fa4fdf85d775b236ba6d136c6ba4a98278237f923d3153a4b71f3a6efb13d4dab369f65514a4dd917f1abd862ca393903b171c381808c866378975d0a694148fe0917980a168a2d0e5cf81"}, {0x70, 0x219, 0x10000, "ab0ba33c84d22c55f48d431fdefba95f08a298b5ed2e11881078c5121f7d4596dd17437aef52bf89cef52bf552f4380e063be5ef9cf9a6df2d7593a584934bc2cfcbe23ac87f881ee0c1fed20cce537e594f9be5214b83744826912e93b765"}, {0xf0, 0x105, 0x4, "7766914c3a575615c09ee496cabffca8581e337fa9259ca337c302c7348f5039fc165042125171c821b6f6c5fc301ac5dceff73bb682f45ca0841053430daa5ce98fe8b9df922261fdfc69d8399f617ca56f4424050384c6f2e013af4978375581b7f795a3b1ad820168954c642ee76fe899656c8dc799ad61058869f713f8a14771f5a30db73f598e609507615abc974909b0e8e83293c942a181c94e9fd0216219e6ef370b8ae6ad60b084183d912393797a3e0a94c02b764b51c91005028b659ad7c6c62c1364014014269f8a09bb90569c60a717a5a8c3a2cb63"}, {0x30, 0x208, 0x0, "5effb7a9ed3b6b94d7076d1f6809ab251aabebec8d34f7b08b993350"}], 0x438}}], 0x7, 0x800) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$IP6T_SO_GET_ENTRIES(r8, 0x29, 0x41, &(0x7f0000000340)={'security\x00', 0x77, "ef4d2fe0904594fc3b90b1681bd5e24356436cfdf2891733abee7b26ef728118b316af595672d406dbf9a2284f6822b011a86532d0585e5ca5e48538eb5d8c8f09cc691eb68f38cac062545fdc881caffae73274b2306fb20e11e58229b4a2dd8ab0220c598da7a76c6aa0b58b399e80767e26ff989846"}, &(0x7f0000000000)=0x9b) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:33 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:33 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0xd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup3(r4, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r5, 0xfffffffffffffd95, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1005}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r6}, 0x30) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)={r6}, 0xc) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pipe2$9p(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r10 = accept4(r1, 0x0, &(0x7f0000000480), 0x80000) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x10282, 0x0) r13 = gettid() ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x1e) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r18 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r19, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r20, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r21 = openat$cgroup(r2, &(0x7f0000000700)='syz1\x00', 0x200002, 0x0) sendmsg$netlink(r3, &(0x7f0000000800)={&(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0xf70b0ae73ae5204e}, 0xc, &(0x7f00000003c0)=[{&(0x7f00000002c0)={0xcc, 0x13, 0x800, 0x70bd2c, 0x25dfdbfc, "", [@nested={0xb4, 0x7f, [@generic="c0d9bcd9897ab3c313660587bedf7d97e84fb254369525e36abde59a4ab5d9cd7dfb8b84fa5ee79b45ece5359940df662623759086ed2705913d417299ed3929cdae1f9985f57481d78701bc2911b69ba5ff73f4fd809f3606372e06f3114e5503adc59ceb79e9f17a41e0d898b5ffa18269fb272deffac58a6922d70850c1ba8eb76a6c30d3d4bebed3c317684ddd0851b9450f54c727b78f7d99bca735daa8f08355343c021d324f5ce0", @typed={0x4, 0xe}]}, @typed={0x8, 0x7f, @ipv4=@broadcast}]}, 0xcc}], 0x1, &(0x7f0000000740)=[@rights={{0x18, 0x1, 0x1, [r7, r8]}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r11, r1, 0xffffffffffffffff, r12]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r13, r16, r17}}}, @rights={{0x24, 0x1, 0x1, [r18, r19, r20, r1, r21]}}], 0xb8, 0x82}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r2, 0x10, &(0x7f0000000100)={&(0x7f0000000000)=""/208, 0xd0, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r22, 0x4) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r5, @ANYBLOB="000125bd7000fedbdf25090000001800020008000200200000000400040008000100ff00077f8c000100440002000800010004000000080003080002000000008008000300050000009bff04000800000008000400af0f0000080003000500000008000300ffffff7f3400020008000200feffffff00000300002000000000040020000000080001000e00000008000300f189000008000400ff0f00000800030001000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2400008c}, 0x88000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKFRASET(r4, 0x1264, &(0x7f0000000000)=0x7) close(r1) 03:41:33 executing program 1: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0xd) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000000)="9638d3cc44676ef866a40d30384f5792aa") ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:33 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r5 = socket(0x80000000000000a, 0x2, 0x0) syslog(0x9, &(0x7f0000000540)=""/90, 0x5a) setsockopt$inet6_group_source_req(r5, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='!:@\x00', 0x283, 0x2) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001616d9ffce64a3ecbf0000000a0000003aada6f16ea794dc8cfb7c510f6df95f91cf4555e78537a5f187864a6c8b8190678ba4d43c741d4d52e3c96efe2d5b733d12b2f5ca359976ed3205d95aeb004c868d70fcbae8ccfa832c9e7161ab393b7704ef60a4c52dddcf4fa6666f8bd6e46da0b6f7f3455d"], 0x14}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000ffffffffffff0a0000000a000000"], 0x14}}, 0x0) dup2(r6, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept$inet6(r9, &(0x7f0000000340)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000380)=0x1c) dup(r10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='.\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000440)={{0x2, 0x4e24, @multicast1}, {0x1, @dev={[], 0x2a}}, 0xa0, {0x2, 0x4e22, @rand_addr=0x2}, 'syzkaller0\x00'}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r12, 0x2402, 0x80) close(r0) 03:41:33 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2852.204841] audit: type=1400 audit(2000000493.810:12266): avc: denied { create } for pid=27276 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2852.438456] audit: type=1400 audit(2000000494.040:12267): avc: denied { write } for pid=27276 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x764, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2852.599050] audit: type=1400 audit(2000000494.200:12268): avc: denied { syslog } for pid=27286 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:41:34 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=""/75, &(0x7f00000001c0)=0x4b) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:34 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2852.651617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5654 sclass=netlink_route_socket pig=27292 comm=syz-executor.2 [ 2852.669574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=27292 comm=syz-executor.2 03:41:34 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r4 = inotify_init() fcntl$setown(r4, 0x8, r3) tkill(r0, 0x3c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303030303030303030303030303003a153503030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r6, @ANYBLOB=',uid<', @ANYRESDEC=r7, @ANYBLOB=',smackfstransmute=,\x00']) fsetxattr$security_capability(r5, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x2, 0x40}, {0xff, 0x4}], r6}, 0x18, 0x2) ptrace$cont(0x18, r0, 0x0, 0x7f) tkill(r0, 0xd) ptrace$cont(0x9, r0, 0x0, 0x0) [ 2852.822485] audit: type=1400 audit(2000000494.420:12269): avc: denied { syslog } for pid=27286 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 2852.848294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=27297 comm=syz-executor.2 03:41:35 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2852.926096] audit: type=1400 audit(2000000494.530:12270): avc: denied { create } for pid=27276 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2852.953965] audit: type=1400 audit(2000000494.550:12271): avc: denied { write } for pid=27276 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000001c0)=0x1c) 03:41:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2978e791605d8e1) close(r1) 03:41:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) perf_event_open(&(0x7f0000000000)={0x27f13f4822fb9ab7, 0x70, 0x20, 0x1, 0x1f, 0x81, 0x0, 0x7, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x4}, 0xe625a7acca09c194, 0x40, 0x5, 0x9, 0x7, 0x2, 0x4}, r1, 0xc, 0xffffffffffffffff, 0x8) tkill(r0, 0x3e) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "3c1bbac391f481d9", "8477f8ffe5884aa61046cbf5f14b738af29d87e65e12041d6422cc1092394163", "aa2b360c", "86d7cb13e3fbc29b"}, 0x38) close(r0) 03:41:35 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PPPIOCSCOMPRESS(r4, 0x4010744d) close(r1) 03:41:36 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x7, 0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:36 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x7}}, {{0xa, 0x0, 0x8000000, @loopback}}}, 0x108) socketpair(0x11, 0x1, 0x80, &(0x7f0000000440)={0xffffffffffffffff}) connect$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x207, @empty, 0xd69}, 0x1c) r3 = socket(0x80000000000000a, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0xf2) lsetxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0xffffffffffffffb6, 0x16, 0x100, 0x0, 0x0, {0x19}}, 0x14}, 0x1, 0x0, 0x0, 0x2011}, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x3f, &(0x7f0000000000)=0x8001, 0x4) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:36 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000200)={0x10000000, {{0xa, 0x4e23, 0x10001, @loopback, 0x3ff}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x21}}}}, 0x3ff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'veth1_to_team\x00'}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f0000000040)=""/17, &(0x7f00000001c0)=0x11) 03:41:36 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RATTACH(r2, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x20, 0x1, 0x92}}, 0x14) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x29) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_POLL(r4, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x8, {0x35}}, 0x18) ptrace$cont(0x9, r0, 0x0, 0x0) 03:41:37 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x4, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x4a8) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)}, 0x4000000) close(r0) 03:41:37 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x1f}) r1 = gettid() pause() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) tkill(r1, 0xd) ptrace$cont(0x9, r1, 0x0, 0x0) 03:41:37 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x59, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x108) close(r0) 03:41:37 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vga_arbiter\x00', 0x40040, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$getregs(0xe18f4bdcb2a8c2c6, r0, 0xfffffffffffffff7, &(0x7f0000000040)=""/4096) r1 = gettid() gettid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0x21, &(0x7f0000001080)=""/226, &(0x7f0000001180)=0xe2) tkill(r1, 0x1e) ptrace$setopts(0xffffffffffffffff, r1, 0x9, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x9, r0, 0x0, 0x0) sched_getparam(r1, &(0x7f0000000000)) 03:41:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000340)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote, 0x10000}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:38 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x5, 0x800, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x3, 0xafc, 0x2e}}, 0x28) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r3 = accept$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) pwritev(r3, &(0x7f00000004c0)=[{&(0x7f0000000380)="970836bf5f35edcfdd221729a9", 0xd}, {&(0x7f00000003c0)="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", 0xff}], 0x2, 0x1) 03:41:38 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:38 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0839da04b67412305410f1") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = fcntl$dupfd(0xffffffffffffffff, 0x605, r0) preadv(r2, &(0x7f0000001980)=[{&(0x7f0000000340)=""/227, 0xe3}, {&(0x7f0000000000)=""/104, 0x68}, {&(0x7f0000000440)=""/239, 0xef}, {&(0x7f0000000540)=""/249, 0xf9}, {&(0x7f0000000640)=""/198, 0xc6}, {&(0x7f0000000740)=""/77, 0x4d}, {&(0x7f00000007c0)=""/192, 0xc0}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000880)=""/205, 0xcd}, {&(0x7f0000000980)=""/4096, 0x1000}], 0xa, 0x5) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:38 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x11, 0x6, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000340)={0x2, {{0xa, 0x4e21, 0xb0da, @mcast1, 0x1}}, {{0xa, 0x4e22, 0x4, @remote, 0x6}}}, 0x108) close(r0) 03:41:39 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000340)={{0x0, 0x0, @descriptor="8cc52d70cc867410"}, 0x1000, [], "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"}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:39 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:39 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:39 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000340)={{0x3, 0x2, 0x2, 0x3, 0x7}, 0x9, 0x5, 0x1}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f00000001c0)=0x4) close(r1) 03:41:40 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x75, &(0x7f0000000200)={0x10000000, {{0xa, 0x0, 0x80000001, @ipv4={[], [], @local}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x4000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f0000000400)={&(0x7f00000003c0), 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r1, 0x10, &(0x7f0000000480)={&(0x7f0000000380), 0x0, r2}}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/dev_mcast\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000c40)={0x8001, {{0x2, 0x4e22, @local}}, 0x2, 0x1, [{{0x2, 0x34d4, @local}}]}, 0x110) r5 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) writev(r0, &(0x7f0000001180)=[{&(0x7f0000000e40)="7955dbbcb61b01d431000a0497a524cd258fb108214dd1cca81110853785bb3ae3f0b7d25a0e1c387c8d2bcba93f5ab5c0b33b08fdaf789bcccbcc3a8d63377b0bf70a7336718dbe11bd1bea72028b364ca8bb02fb43524006d149ccb3518e30f953cddf0d17a42975a7cdfbd9b64bf88f44f918392d9ed7b1004621962218ce03", 0x81}, {&(0x7f0000000f00)="5c461eee784d46d3c2b93a19caf6dce0d53cd1512a7acfeea5dab6e10bed18687fc447fabe4742e83698b7a8f4dd0abb6e96c705a5e5523a7ced4f1e660ce4b01d0c6643206b3e613be6df2c3bea3286bc11570777e534247bfac1715aa1f3e325c0732822345efbe2bdbbf3f1a257dfe773", 0x72}, {&(0x7f0000000f80)="27d5e4c8e095c92e605236f9fc82495d50da81a28da952cfeef1956565cf52003b969277885fb56564600b88e0a51d82fab01cd1d5075301c42ee3d6963480a5da10adda483f205216424403ff5643692b960253d21e4f1b6134b943855de9bed0febbc673cd34367929f68abe794b0988cb9054be2bd40b4f36bc0aa77124613ca523826db2a1de90f12b01918104758bfe6cb9687c20d2c9e0ae09383ba1d8c2a0f2dbb870ba5ad5b4dd462480436824f9350a", 0xb4}, {&(0x7f0000001040)="778143d2d281ff28266363d09c5d0eb985fa7a0bd67ea5e1e0258d5f2db299ed8a643881253bb934e929ebcc1d304974578fc89267b2afa44a2ce217b8e2945d397889cfe6c89eaba099a83810637caee8f66ece1ff7dbc48e8b35f2ed442b22a1e1c6618ea3130acc0b6be8fe2ba1bbdd8b1e048d59bfd7c8be3e5bc7b0641c783a730728038fb011a9d17fdb78b816ff464ddac36cf7e9dc1f221845d4b27c0beabd6f453653a292b96be219e55397a4f71debd4445a8eeac9d59661eb41f2c3e8814a445c8a225d190d031510f90ec4c22191ca26dfeeb18c074e", 0xdc}, {&(0x7f0000001140)="73541a99eeda7a2d4ecf41c58ccff1e38717dd3d172096f74c5ef3ac13f466eebd63", 0x22}], 0x5) close(r0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000f800ddff09000000"], 0x14}}, 0x0) writev(r6, &(0x7f0000000b00)=[{&(0x7f0000000680)="a6c70ae0c998c63c73cf5d793faa75fbe92ba0bb40d422d125888ad5ad4e6e9065a32f6fd8b92aef109e3ed6ef08cd27b33f18be43a92021d2d615b2b8121a443469a209f9f7ef0dd9447d6072a109f7e2b7b6e5caab7ba7eb3b8361320bd2c852e3df73fa116b762d391899c30a1b0a9bd7e5e67ec18a3676a523ae3cd9652d12328c0d8c3743b829e65da9d125875b9f31b0a4ee350af07afe91c1ca6b743e78231d9843b26d38175a23efad557a0190ba1b3394", 0xb5}, {&(0x7f0000000000)="6d4d4fd169d30fb848033152ad93d69c795061be8270f68b92a55fa5d3aed1561470875c8fa63d887d1db9e33320994010c37193c4c2f319784f6a506f18556add7d1df64b9ec0d2e4ce43978ae148e273e1b03319d23b7974b3f86d340e04b74d1c79befd3b8d6c6d10585a6572cfaae6baf1d51b669860b3", 0x79}, {&(0x7f0000000740)="dff70488244e0e7bffbc20ccc59a03fa8fc7b61d2265e264d14d22306ba3fc7ddf8441f0d0fbd9a088d3970adaa3a01649d771eec44ee8b518c0e3219a773e18eef3a67d9b42442ffa7ee71d7254910dedc6a5b24494d75d5b92c160da1d2d055600c321ece2678768775ea51819ef152e90f7abaddb8c9ec3009ea88269450adf7c94c629d25ca1a1a727a951f3f5857ddd9185132411740f2a5f9006e0f7b277", 0xa1}, {&(0x7f0000000800)="eadb10d92b3994d666066cd0b16602e0f5a25b3acbf75b6b8cb8b2ae066ec81f6ad2efd0be6cdb0589e1eff5e031b0e7c6bff6d223db71ff062b6a95939fbe42acd5fc24589d11363b702a875618fc0a0c8f0765a0c990fd398c25b74ed3e88e00465bc0e19a509b4f", 0x69}, {&(0x7f0000000880)="eb42ab8b48fa9ff576674ffa5eb7ecc2f2eb1c56f449949a289303c8f87683c615a5c1b4bf2d75184afdce80367a5ee1eb6ca896774e249603875149c4c9e716d218e3b71cd9193438c8a69a5c8b13d4b60ee7788959478f7075d7f5c97c2727fc450e9d666a43da28716f415dceffbac0aa37e3e6313cbeaa96c8f18c62dc3f1c4af2c1ff416b20abbdb2c28036", 0x8e}, {&(0x7f0000000940)="0713082a37d24e4d755872c393ee83eabb305b4f4885e2ffb294340717ab5b06bc567ddf866325a53f35d48eaa50f66173a7e07a8ec19d25396e6bc0a4158432dfaa1e341690", 0x46}, {&(0x7f00000001c0)="94ba02377d17296a3b38920e937f954f28a4dc9a15fd35276e117b94eb970bde510d1bf26f59d7e813f95171da1f82d4b3c9", 0x32}, {&(0x7f00000009c0)="3da640ac880866f1eb94373a34c9a14e76a43acd8f37a57dae6d640c777bf1e3b8d41a5d0ed139ec", 0x28}, {&(0x7f0000000a00)="693c918ed5c454ba178f5168243ffd9ce805847f6ac70ed6a007052a5419f058956b356086a29c6d2b09dd6bbe18dc92a64399c6fa06ab3d35de993f0bcbadbf7c49e4fde548913298fb31cfe6557f8db76369ca7bca33c3c88d044470669e93da25171144c63aecb9589c01952ee10fd5328ff0984484aedc1d3db7cfed5a5d57ac4ef62cd9ebfd6804586b25272644e8b83dd3b42f72f63ad0b2d72f63454de2c05fb5299262c364be42468ba08a05c39a9bf9eaf48e5bd32613a3e7bfb829258faa486bc764380863b4d6ceb78e6649ddc5cea175c8a0", 0xd8}], 0x9) r7 = open(&(0x7f0000000bc0)='./file0\x00', 0xa200fdf33d62b2d3, 0x0) write$P9_RMKNOD(r7, &(0x7f0000000c00)={0x14, 0x13, 0x1, {0x102, 0x3, 0x6}}, 0x14) dup2(r0, r0) 03:41:40 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) close(r0) [ 2858.706915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=248 sclass=netlink_route_socket pig=27447 comm=syz-executor.0 [ 2858.779521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39113 sclass=netlink_route_socket pig=27455 comm=syz-executor.0 03:41:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:40 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x202100) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r3, 0x28, &(0x7f0000000040)}, 0x10) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) 03:41:40 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) close(0xffffffffffffffff) 03:41:41 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x2, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000380)='dctcp-reno\x00', 0xb) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet_int(r4, 0x0, 0xf, &(0x7f0000000340)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000000)={0xba, @remote, 0x4e20, 0x4, 'dh\x00', 0x6, 0x7ff, 0x12}, 0x2c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat(r6, &(0x7f0000000040)='./file0\x00', 0x100, 0x1d) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f00000001c0)=0xa6de, 0x4) close(r0) 03:41:41 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) r10 = add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000500)={r10, 0xfc, 0xc7}, &(0x7f0000000540)={'enc=', 'oaep', ' hash=', {'crc32c\x00'}}, &(0x7f00000005c0)="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", &(0x7f00000006c0)=""/199) r11 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r11, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = open(&(0x7f0000000000)='./file0\x00', 0x8802, 0x80) getsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000040), &(0x7f00000001c0)) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 03:41:41 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) r3 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x81, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000380)={0x1, 0xe, 0x10001, 0x5}, &(0x7f00000003c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r2, r3, 0x0, 0x1a, &(0x7f0000000040)=',userem0posix_acl_access\x1c\x00', r4}, 0x30) [ 2860.286353] audit: type=1400 audit(2000000501.890:12272): avc: denied { create } for pid=27487 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:42 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2860.552394] audit: type=1400 audit(2000000502.150:12273): avc: denied { write } for pid=27487 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:42 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x8) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fsetxattr$security_evm(r7, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@ng={0x4, 0xf, "0b179b"}, 0x5, 0x1) accept4$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14, 0x80800) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000001c0)={@mcast2, r8}, 0x14) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:43 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) getsockopt$inet_mreqn(r1, 0x0, 0xc3fa5711c3d111f6, &(0x7f0000005000)={@remote, @broadcast}, &(0x7f0000005040)=0xc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r4, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r7, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) 03:41:43 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:43 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) r10 = add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000500)={r10, 0xfc, 0xc7}, &(0x7f0000000540)={'enc=', 'oaep', ' hash=', {'crc32c\x00'}}, &(0x7f00000005c0)="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", &(0x7f00000006c0)=""/199) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:43 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000040)=0x9) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f00000001c0)={0x7, 0x8bc3, 0xe00000, 0x0, 0x9}) close(r0) 03:41:43 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:44 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x7}}, 0x10007}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fgetxattr(r1, &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000480)=""/220, 0xdc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000000)={'exec ', 'posix_acl_accessvmnet0ppp0\x00'}, 0x20) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x190) 03:41:44 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:44 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e21, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x3) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:44 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:44 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2863.162759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25972 sclass=netlink_route_socket pig=27576 comm=syz-executor.0 03:41:44 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') close(r4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:44 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000400)='/\x87ro\t\x84\x00\x00\x00\x00\x00\x00-self/attr/current\x00', 0x2, 0x0) write$smack_current(r1, &(0x7f00000004c0)='syste\xe6>3a>\xe2\xca\xd5\xe3h&\x14\xa1d\xf7_\xa6\xd8\x8f\xeb\xb1\x93\x7fm{\x00', 0xfffffffffffffd0c) accept4(r0, 0x0, &(0x7f0000000040), 0xc00) r2 = socket(0x80000000000000a, 0xa, 0x80) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e21, @multicast1}, 0x78, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='ip_vti0\x00', 0x1000000000000000, 0x401, 0x2}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x50000, 0x93) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000480)=0x9) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x30000, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:45 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockname(r3, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x80) 03:41:45 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xbbca) ioctl$TCSBRK(r2, 0x5409, 0x3) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x8d}, 0x28, 0x0) 03:41:45 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:46 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000480)={0x10000000, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, {{0xa, 0x100, 0x1, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:46 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:46 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'ip6erspan0\x00', 0x18410}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x80082102, &(0x7f00000004c0)=r7) pwrite64(0xffffffffffffffff, &(0x7f0000000340)="008a277aa57824f2aad757b72a7b8fd2d862a84f136cffd058b9a5b43cc7eaef0ee0404ec3453b28ae690e99742436124aa7e36543c06f7a887257344f534baa287f558d351e9a71a712a99217c0ce7e1fd7e764f0a3150b1120e3a6643cda571405300bb7acfe7e348758609cec3b165ed9be2be75dd5399c86974fcfe09d10bdbed1ce04ad328129dee80d81068099ba9730fa38e3b85c67f0f3dfda127969c91a1aa9cf7e6b01f37e8de0ea87a0d445bdcbb675971e8670b070ed6de007c95f3a9eb00448411110b376b2", 0xcc, 0x9) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KDGKBDIACR(r9, 0x4b4a, &(0x7f0000000040)=""/18) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r10 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r10, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r10, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) 03:41:46 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000), 0x18) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x141c80, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000980)='/dev/rtc0\x00', 0x30200, 0x0) fstat(r4, &(0x7f0000000200)) fcntl$lock(0xffffffffffffffff, 0x10000000000025, &(0x7f0000000940)={0x0, 0x2, 0xfffffffffffffffc}) close(r3) accept4$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r7 = dup(0xffffffffffffffff) setsockopt$inet_int(r7, 0x0, 0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x0, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000400), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x1f}, @multicast2, 0xffffffff, 0xffffff00, @empty, {[0x291c6316feb156cf, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x16}, {[0xff, 0x0, 0xff, 0xff, 0xff]}, 0x80, 0x9, 0x81, 0x8, 0x0, 0x9, 'veth0_to_team\x00', 'hsr0\x00', {}, {}, 0x0, 0x80}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x2b}, @empty, @dev={0xac, 0x14, 0x14, 0x13}, @multicast1, 0x9}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) socket$netlink(0x10, 0x3, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r8, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={0x0}}, 0xe6cdd00eaebf97c) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x8000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044}, 0x400c010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) 03:41:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0xfffffffd}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:46 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) ftruncate(0xffffffffffffffff, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:46 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000000)={'nr0\x00', 0x3}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x3a, 0x3, [{0x1f, 0x1ff, 0x2, 0x9}, {0x0, 0xffffffff, 0x6ee, 0x3ff}, {0x9, 0x2, 0x401, 0x200}]}}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0xb4, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:47 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:47 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:47 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x2000000, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x20) 03:41:47 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) ftruncate(0xffffffffffffffff, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001600010400000000000000000a000000593fdecc6dd09fc0b4ade5c5dc05c9e206a4ac35e7e00900000000000000dbae8cec2fcb8c0b5d3b427e1d9fbd3ff92ec7b01e2e7b473033306fd0ab60f3498acf0428cccd82862700dc4eeccda680876e558598281d36c8e79e320f5cd2a0e137b32ff658034f2a63c03652728ee4e416345b32003e4929f5ff7e7e7ee93e8025f9f3ffca204f23f8101447c8e156414beaef39d7f6dd79af8c08650ad7465f75a740f0561928c2c0a72328eb1ecb500eb54aa640214e52289b72b1371a7663bd53cecbb76992277d98fe0823f1286614500ab4e2300dc95629524c505c9989642c45a9a698df65e4fc2df042794fa1b25b40ad01ce6398b04d31738e72ec4d6f1b398c3b3f09dec11761acd362f8cdd18fd1bed6da00326cdcc0a99f2f6ab7615a9972cdef09574fe24c517635a5189574f97ae3c1acf46168ed7f0d89eea771212960a42489c3f8187987819a4e6642b63075db738efb8743de1890c4bfae113567694e6f2a4f8940f9219755c2fd1fcde2f1dfe88b63879096888f84f71f90835624ff14fb4ce1"], 0x14}}, 0x0) accept4(r3, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x80, 0x80000) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r3, 0x7002) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:48 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1e) syz_open_procfs(r2, &(0x7f0000000000)='net/ip6_tables_targets\x00') r3 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0xfffa, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e24, 0x0, @local}}}, 0x108) close(r0) 03:41:48 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0xfffc, 0x0, @mcast1={0xff, 0x7}, 0x9}}, {{0xa, 0x0, 0x0, @remote, 0x4}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:48 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) ftruncate(0xffffffffffffffff, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:48 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:48 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0xfffffffe, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:49 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000340)=@gcm_128={{0x304}, "005d84758229df70", "f3ed5e66cf8594134a639045d054b340", "3b430de5", "0941a0181bf24cff"}, 0x28) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKRESETZONE(r6, 0x40101283, &(0x7f0000000440)={0x8, 0x10001}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') close(r0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000380)={0x7a67, {{0xa, 0x4e20, 0x1000, @local, 0x2}}}, 0x88) 03:41:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) bind$unix(r2, &(0x7f0000000380)=@abs={0x2, 0x0, 0x4e24}, 0x6e) r3 = socket(0x10, 0x803, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001610010400000000000000000a000000"], 0x14}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x30000001}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="ff0800000000000000000000000000000200", @ANYRES32=r4, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x65, &(0x7f0000000000)={@local, @broadcast, r4}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r6 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000400)=0x5, 0x4) setsockopt$inet6_group_source_req(r6, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) write$input_event(r2, &(0x7f0000000440)={{0x77359400}, 0x5, 0xa100, 0x3ff}, 0x18) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r7 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r7, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r6) 03:41:49 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:49 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:49 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x8) close(r0) [ 2867.912204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4118 sclass=netlink_route_socket pig=27714 comm=syz-executor.4 [ 2868.010702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27723 comm=syz-executor.4 03:41:49 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f00000028c0)={0xfffffffc, {{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, {{0xa, 0x0, 0x3, @mcast2, 0x101}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) recvfrom(0xffffffffffffffff, &(0x7f0000002a00)=""/220, 0xdc, 0x20, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000002880)=@req={0x28, &(0x7f0000002840)={'veth0\x00', @ifru_hwaddr=@local}}) sendmmsg(r2, &(0x7f0000002780)=[{{&(0x7f0000000340)=@nfc={0x27, 0x0, 0x1}, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)="8e66b8bda2f67a4e7a7f406552852ba16761baf920553694eda838fa62579bebd0df974c970a4d3bb64842d39a86e866f8ea99941675bebfdb4fec5b8cf6cf72c3bec390cd38a74d1d3c8532797896494d98f82e88db9a3c14a4419d8cf8fa449b5049407bc6055946663702aa99aafece82fdab3727fa24901539ec280bee7ca7cf362f146e9ff7895883541fd14a5727979a064ea8823da942f756f0241c9db3d9193d6d3d81b0c1bc0bd3b307ec6c1bf0856f8026e34bbf1cd6fb614c30d5b42d267cc6341080", 0xc8}, {&(0x7f00000004c0)="c6845a8af613caf865cf55fb9f1f982d0184ccebca345a6cc5f76830e5cf3f3bda99f66f5c9040153a15638dc7c531e9059e47fd2b07106cb8a98c621b255cd372e26bac151db9ed24fa51183e9b98456cb97000dc8b2670435d8e", 0x5b}, {&(0x7f0000000540)="a2ea4509e192114c588459c2295a89a58a800967c3903fd30a9d38790c8034ef4d7360820448b6201c8b48f714653315a0e664f7d5295ff7757ba5703e15da1200495153a2b6ed86495ecc2da496c99d2551648b5eae5b072c636a0050733cc76d5a0107ee2bd83488885bb887589b6870a730c4647bdfe40b0a9614fd8737b41b7f2c603bc012b7224f7df883880102aef09cf348947dc55fec688eaf884a823a848c85e7d17aa88ddea67467b9c39257bd9bb8e3b968cc92ad2c8004bc82fcdd5916785a1eaf25b0bb8eb7b7550e8068f724842d7c594e5eb20486611538e208b3401d096779546ed7", 0xea}, {&(0x7f0000000640)="0b1dad1b233b93c85489b0ba06475843d85897a219f9fe3c83d6f96dc78ed62474e75c65e63b22937cfe62170e19edbb151f72beb7affa4237fa06e87d32a4e72f7eec9e34907fa4ccd71cd8da2d3f7262dfb3560638ea237791c1b16e9b", 0x5e}, {&(0x7f00000006c0)="03834bfbaca9ee8e86cc1d96f5d77bdf4c12e0f8ebea74c4a645a0c079dfbe0f4f8bb4c8e7f8d761ef96f81955945fd475d8eda320a85aaec977dd3a9272af3a9bdbf6b80c245b805c620063ca44feddce6739b19a359e4762ffc30a249088d4185fbb27ad9774647949debdf315135f431b16acdd6c033ae0006798fcd5024166c5f4334a3a94f8d1893eed28cb386816ca8c3bab2b7199984ad3ce332a6aacd454b804158c4ede1ba67bea9e5277deb8b408e2a7961ebf6754a81fd69d54e2f8f1c4a49ec5e907b8316532bef70609432697", 0xd3}, {&(0x7f00000007c0)="92f00c3e7851237c7a82db505cc356f6f86e3e0b72a026bf070255dabf1017fc2bbae9900afcd47f57b0fe78f8c2bfa9ea00", 0x32}, {&(0x7f0000002b00)="f5cc2954f4bea66d90048d3b00dbdf5177591f310585d692e960af7ab398b1e2d8398660f3fe9dff144aeb418d810c2240115bf5f06b49b5080676cf5db1d3544cd9bdd0520c6e6e63c2ca7a139e4d022d2c6f8a95fe01a9c1", 0x59}, {&(0x7f0000000840)="ea16be529bf6d1baa53ef382aad187894d9b25470bafda4807a6c1cd906fdac77af3b89e3cf8e3f94e8e622d0a7403c59c86babd2f9bc34d9902d139757a6daec7b4c3467141e8e31fec0afeadf95c3af58145209386fba7aff3d8bbe6ac533a6ac5ba282ff3c0ee5ff8363c5ce3b3b42e0fd9458afd5ec886a885225e060c3a711072a49b8a4f868cf901d4a0da5ad7dfd54a", 0x93}], 0x8, &(0x7f0000000980)=[{0xd0, 0x114, 0x3cb66f2, "c4acafeb3e6af07dd78491b364e4049ce05f5e71c3ace3910884ca25b071fdfba4e050b56aa39751551758b048a192f1c1fb2cc1fa717ec0cbf09e3c51238ca9b298093963f2ed6a6414355077438e42e3a2e675ba802f157d20b5dfe09dd19093efb818aa59e6508083ccd846411cf73cbe6e627c57ad8e7d50a48a0c9897d1f0fa3e6115243cb7a40b4e26d95aeba488b0bd8a3fee4edc0dc9845351504ea2b506fdb3e4911b27cdd54fe387b558e4efccefb15bfc279d705d34f7"}, {0xb8, 0x11, 0x80000000, "ffe48a22a2a476555dcd3a22ee22025acce5b7cb14e93786dcfe61d711656579387165505687bc4f109ec53086f492fdaaa21bc09cd3099515b1f1b6226b5615bf23dd63df16e8c9e835464735123924a7423066071de919282f3e79183f9781e47f6382dab953a591c2a0b70912c26deeaafa50a10d4530b7ab03e5f25fa33cb8d2fae263e9630bdb45881678db4411e7df9710a1d406e539db1024802c2155d48523"}], 0x188}}, {{&(0x7f0000000b40)=@nfc_llcp={0x27, 0x1, 0x0, 0x6, 0x4, 0x1d, "7a289b5f2cfa1940679c95d6d611d4fd6c444b530364553c21c788626ebd83f05064998ef6947ebf06d22c90c7683afa4508f3dbc18695f04e7ed16ff7e781", 0xe}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="e712daac04155b42b34e41c688b051500dcfcfab5352cea66622a04cfbd9e39edbf3a5202d041acd2e91f981e41c91f240f706dd1141e1f49c1b1058a1aafb263cc1135d48289a3f17bda824a53f6c4e96075af65e76e162731787f7c4219d62f587f0bad4924d5dee2fe1482db10be762474981d926ece862299c442f4d", 0x7e}, {&(0x7f0000000c40)="b204e7858e82a527b88a30c78169581b957993fbf5a570e744974dd4d164be29da9faad37bb89b52c9dd7413444006acd228887d6de330c5d7cde8b9e2996f186a560e9786bc23db3469665e0c2ed201aa0b2788178caf28ee3a791ed56b3744a9184e9d20c1e0f788460f3ed8a65753b05da0af7c163d45b2492303ec9eddfc221482f3192a0d243f3f814d323a", 0x8e}, {&(0x7f0000000d00)="6101865f0100cb640bcc0577ff2d5dd65322fca4a1715c6d1f53308df40a6cb04389a7e35cfebcfa80aadce1432e629d2bfef3fc7b33398b21686252019e26214c3600ec9fef9ce4f7ca12c842c61a7cbf260a48ad683f72785e092a87169a67ed40115b4f9c6e8cf411cf214309910563091ead2f81fd131a52679aa3f414b19068c79c774c8d5dffd266d9ba8d005ec6df9a19debf99178310651368e5a2a93d22858ccf5d2d146a947e2607adf556cc792a8ab313e871dbb3da1886d528ea65387280e9c8fe20bd7fde3a503fb9e1411cc85d1e71e804ff5ef94bf6c00cc9cc22083dceab6db632e8b8f22e60272be428f1", 0xf3}], 0x3, &(0x7f0000000e40)=[{0x78, 0x109, 0x7, "77b36d41c66c503a59c2b5cfd059fa0435fef3a44d53cec86008273e878fcc94d6134d083bff53019e13375f219b33197e83edeb50d97d81169b2b5f159e5a84ad922f30c03459c32f662dd0e9b100cd504b5c2f523ddeab807b63184f95ea271379d9ef148bdfbe"}, {0x58, 0x111, 0x2, "2b297d2d670ed96114830197e2744b00a1cc9c0e6cbbfc62c1e0b6270ed89061db8e093681a512d22750945b5425567c7c51d6200e483203755e6d9264cb0c0000bd8c0e00"}, {0x88, 0x119, 0x2b2, "153c84b50b01b96d14882dd2ebc7f42511818951840047926cd532743d116dcd06b68051d3305e0a209bab749f9ec0d820754a2b452df8f9db3350b36295d41f46caab542a9ed7225183ecdcfffd70911dfbd6b69866f087d07a64218d4d8ba2cc3b8e47e736735f8231a71a31f6d42d00c4"}], 0x158}}, {{&(0x7f0000000fc0)=@rc={0x1f, {0x1e, 0x1, 0x0, 0xc9, 0x1, 0x9}, 0x6}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001040)="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", 0xfa}, {&(0x7f0000001140)="0883aaa43acd9cc6317109eee1470047559ab0c87fa9b2d935022042babe2070bf554a9f83484627614e92692ccc4d1ce9f20363f9c4ad161a872ed1a5da2806a18667331bedddfcdde7b2e9cf53a96bf3828f561e817cf686a42e2df466fb395d18709b82c3b7043b1c24504d7418a196829cc0585b4d8ecd0d943752ce92f6f49b347e9511d380678564a9d4f026fa63cd4ae9ef266e8a850c69ef1fc2688cd24103882c81c3bb5cf7b03e2eeb82cc172bab1493772533799f9c2c0aa569f45f5e238c6db060e9b03935770ed4ed44a5f8ba198f3d56dd6523067326f89257b873b30b230d", 0xe6}, {&(0x7f0000002b80)="4dcf16c19c69e447e5f5e5e23b5a142c804d069118b799d7c257b4f19f7db7598cd58a079f270177257e805bd3338d4d02eb6d0f6f958ce922d53e1067e02538b833c85decb5f59ec0199002c4bf00b6141f8b3df5c7e7461af627057dc7e71e76bfe0ae1ea0e543f687db0d2c4f7eadd1c3c5eb2303f6c7ee39d800cf78f787fccb173a171e1684aa9b1bce72c5e3fb703072197d72bbcb7cfa4bd24315bf1e432ec1cd293f592acef3f3f6641fd1814f876607e4b5564cdb404bea8394c223c8d9bd717f306d718e05520744f37dd56cbd0a12a359873b6f752c33c030afc6190ff67400f8388ccf887a638a56059732ff4d0da75b2b8558673b75479b12b2f9eda286364f81842091ec9bdaf4b6e3e917a9e4bbc9d7024c1ad5c48ca78fbb1ab24dd06f050081df7afd1321e3a264a3c8beaf561f0e3a076337d6f1a6eabd8eb4a7eef959018974f3102b529b0d5aa3053193805a797539770fbe1df7641a6cf2d5ac02ad43744eb76b06e5b40239bca05f093f05a868ee9bc2a9aaf381efb6c0a50dec6a599177b7b982b2a8aefaa83e86d55b88dd6bce491f64159927328eda5c3f66995caecfe0f310805930474c15d49cf52fe1e091020fe1d361fcb8343956b9b14fa9d9db315ecd677a1a6751f5cd246db98e86e2298716be482f9af9bc0b7f2b44f00ad730cd88814ffebc5b5061c406f7edd4c14e1e8c360bbe8afbdbd43e33a2bff9cf425761e3d1211e1ce80d65eec222c287a9bd6e5f9550ad942845956787e003ad60ae4ceabf212e5846bcf23964645fa56ce8ae730b94dc9a1bd6929d9ac407f420f3742cce0c0dc401dba0805012743c7f161e48f1d95b2abac6cdfc64a15f6b1f5a4b193223e5677384ee649c8406cb03a90b839d0d8f0e46a7ff30407ccee76ef695dc374083db24cf14a278537b67b5c72162d8e1662e709c728a51269d855e4ce323154f3b51191751064ee076a4f6e671d76877a7062cc3f33cda73d7676d103c30520ece7cf92479bda8179713b3312e455e0116336930e542833d3821fef8fadba2449fca6cd688f2e6106d052303109e416d42eb1d1d8b046021bcc8b54483ab078c0e1161e2b9f38aee9a391b2cdaf6a6f5e9f7d95a8c955c34b0c7dab00162dc6bbc6b9f3be9efeec25078da946e7d99863a3e4ebabdeb72f134e71fcf730578a2c6dbe8287eeec91f1d6f2f953a103e8105fb678711f002d53305291bf112ffd5c273d39e8197d467ee7940e4e7f2a8ed3e97b543f4f3641d6480c916caef2502b158cdf6fe1f3f7a83321f44e83cc6f5cf378213c86ea401c86f77e119bc7032856b5f031dcd04c76015951d6ada8830bc2e27c51afe4ac22f2d0ffccc25daa13347663602f8e54362722916ba2fb141c58e210710e316398e4ecd36e4d7f358a955b93e8b6d20ef0c8140620d9302d4d27a26ab3c214f94df4ef933836ace88ba57bfb913bbe640b3bed79618e4a8c0c147671a93089c63c9cb98e89454100e47dfc5fec74523e216d94ff06f4a91776478761f662edff99a80466216bd7b55e18aa013c1b5d946b28205ac057ec3039ea1b0265c20adc2ef5fc691790c325d9dee08cc76d412c55cdcc3977a8763ad69ebb969050978d7144f278dcea614d7458454a77d5857c3c2d069788ad683019ccd2f5f9398e3476fa4259471b748d4b9d11223931981183d4785952a0b95cb5c3f312d00826f63327f70e0369cfe6d972fb2152ab783508e32d71b8069336ab07aef66674274b42bd269bff3f270351de95e36a9883791a04415ee98bdb95a871af22cc9dd93be746bce238623e23e2695c629d5b2b938ddd5346a0bece2758fe61ab3f6ee2fbda721cf13c66af3773cbb6be1d73b1f34777dfdc72ef2562741b00faa404b835b0315d249cc128f3141d14eff114c3e4dfebd835600572bbd40fea82b1721d7950f68c788570d0bd2150084691ae60e47fb0a8ca1871f021b5477489561d208c28d378dc5fa57f21f180827a258f4ccc84feee4960a672d4e15933f1293ef498babe2a0dc7d03794add84f6ad4e5cb800b69e3960a4af384ecf2058241396eeb41e666277a829e0583f30deb3c4d4e95edd736357d3de893c054c73a6088ed4e8d15748a10aa66ce5c27d70ee85a6bdf8e64a1552fbbae73f6ca0fc27a44d89000018252fab08f03ec5e61d0ff9cea4f3d30a8838fe0f539e6d4db1ac77fd4d31f448d20190e68e16bdf51d1dabdc329130d137894378acb8065ec27cc5ee74ae8244b4e29e214b007cfaef9b17613b90dd4378dfddcfe761ab687c8b2061e11d9bf7f107c1cfdfe51400b8bbe6fd628a54e6fedf6d00cdcc1a7d1a1772b74ad81393f220f6982d49fb1a8310db84b51f9cdc27fd108cce57988f278dd137ee66499651fa5485bd0ed9b5a701c76c36fc0eb18ea55b410717ec8eab52cdfc1ea7607d30b26dd60dd63cd7eccff8255b4b91e1feddff0bd64a44f899e4bd3cabfdad050032fee7b6cec15af4f1ff605297b93acfd3788da808b2f1dd048769ee2c9c0cde8609448ea0107fc390402666c74786ae4f3a41d44c7df7131d916932d77344eabed4fc7cebce1f63db63fb4ddb63cb63536ac3503f90ad5c845f20905d619a902b7cb3adc9a164946b04fd7f15f298334c9f577bd21a6f27b978ab1faffbab66fe03c00d0e4d3de12f16222719f3d062fcf4a3456ecc2fb4aeaa16bb09ab23fac54a61770a87855ef25392ebc256115a20124cbf6efa0ac4b65b5ee0b8346f26f3109fbd1028e78e39da0f84ec23cded52517f42fe0d81e1be239e014664d639e6b366131c1770f8c539dc441ab2ec1fb8d26ff2614d846c4da201e8e8821ea7f934f22bee536b9bf1d98905fbec929c0a992b36cc62006c88e149ecfe7959174dd6f1d8858da99e2c613f6aa5cbd66d833642925dc069a3d7262fda842eaafe56781b9a147d5babd8f17ac70f4ad79bbe9d5d39823842c66c6a38e41e33ac6d6df9d6a912bd019be22a1c1976a876ed8be663f31a6a9e8c39b98efd802d18c7df55909541b9377e20871d9ff3b984e3640d565e7a5cfee9592c64541b62c5d1f2e382ba0264e94c5f8bdca7ecdae3ad3d3ef6197e69490223e0c7406e070af3f9425e4c3c69e9a6dc1797eebdfbac4f03c3f7006979a573af9abb2d1fe415d5ae21316457ffc53dc8bc8529562c62b6a76681332d9932886a7d83b558ada40c155000b9ed7cc39548d2572185c5aa1cb785034ac47d7af96c28c7ef4e913d8cf08f57390f82090234f41745fbaf08ff728edd08c51439fb6c2980e7ca22fb89da594318ce35ad399cfc827b6c662d88fe624f66df0c164068149d7875154a0999a5532cfadc2d33c6cdbdcf9e59037fe5fba1df5c039a06224b1949b58287fcf7cf740304992d2ecd5f1f554407dc6802202adc1338cc540f8ab9f41237a442b8618a412d9abfda4d547a3fb7e6c5183cb633c14ab0c16dac801b3a09876b0f29f1ecc0bbe3feb5062060dd33063a579351be3167ab90a21f873747ea6862ab52c3d0064da65ad58ad2c2d520f04612c95266a03186b374e7de788fd579272800085d8cbab3f824dbfc68460c6908c51f61106eb3f8407af1a6b21055f4ec9e2c56431372ab0cb4d37cadb4131b7f8fde6fd255479063c825d3f65eaad1e9eeb2d85580a2fa20350dfe35496d9a99b641b45b4a4ca46653a2fbdc9de56bfe8b0d26bcf08d3eb94aa80719f21a996407b154a2c4db208ffb48b5140fb9bb49f7705055d6d4276d05a2c76762b5be148cf00a333961d2c46d3d0455fc3aa484ef0632e11ebb3e5a6fe4a4468a51c93ee9d362e0159b0c7a6f612b458539997363543312135f467e4c4ca398c89991e28074f6f58ce4062a596f386f941ee10b4bce1aac23e700ea9e29b1293c262a016e4cc7b9a8224b624c90b302ee26de37e6c139f54b0c69051ad21300c3866469b9266566f722dcf504b51c05a33dd64d165c02087dae4cd89c9f1c928895700b0244f0612457ac8d171fbb4f8fa9cd9828f02db110d42a550dcd2c85aafc4c8a0d8890d4340cd09352bd777cb9fec5483ec256055b043a212ae8eacd34be6b30a9a7c4acc03a52bc34441430e0e2682ba294a1e4fafeeaa299fe7ca92c55b56a51f7e3df33df993ca6000ff0e74a7fe01015ca647652300872a7da01d778a70bb177049530849a4b70af4db9e402c6de88f26c08344296e9a7a227f80255d7f276e2392eb3f2bb4919526feeb1124f14697d6bc66a90e8a058883c988eea63e8e7b3d13ad600fa39b6f3393be3303862a5b1042944ea50e62127dd087c2eddc5fdfffdef280d5619c6887e931bfe8fecd4c8505652b7ddbff3babc3d668070dd876ef053c7af15f8693fbea3c9cf80d86eae96b4322aa453e7eca98d1264c9bddf3ab97f17b105b00882b50afd3ad2c6b235889932c0c6848c779974e4ff0b2f5004e2b815cab73261a4d991804414601d47d41bf0d4adfec8e81790de94f684aa317211b74f457b06622350a08aff875440aabc822d00ce49a535585e81e33622c47015b01bb883aa6d8377e742763219d834f5236e3de5f378c83fd37e67ce90dd9531e454d291325cb737b2be9fcf63c7381002db5fc0ece1b9d1a46f26db0474b0a5283c5556de5cdd39d3336e52ee1a94eff6155a6a1d5b3ac48dad6e223508911ac45065c0474d6c634115a140193011104f6e8ba3656921472dade00f60cbbedd3b58e1372e2c29515b478cbcaca11a143ac799b4221a69facaf4d0ef2535673fd67e8cf1e39bee98b3f09caf7f1830058c81b620831c82799162a48bed179b7fbb0eb5cb3aa87d3cb2bb4c218c520c606762a254d27e376127f04f17a40da9f8729c61c51d8338a639ac2d1e74d8e283e6e1a4534932e7ce4ded150d0fe414dec853c1528cc021ef5724c921f979c9cb1aeb3ce26b953ab73652731fdade84f42f752a722908a9a9213ca9096232c28f2fcff66b8fae06e38c6729f1c646a76bef9c1706c1fbd2a11b245036f0cfd826f75845c7feb85eb4b17a3f20caf2afc5749060cb196a151ec7538bf715a110c55d5a3a0c626f466fb918081823525fc5030ab8a5f5d458d2597cc14a8dcc92286e24f939bf6ac4b83cbe30736f7ddcf115350050a85b564c2b035675a0295eab2a2764ae18c1a46bc691b599ae7c085812e39b7ca802b09d77204e79543d6eed3798cda986f6e5e3bc2299d4907ca6d40f7d5a0c9390220130a7c9bec63ac1dc2317f049b2c7114a0b03690c592e57fa34eb92add5fe3de5081fb3c742987d479e8fd74dca253506ee62531a26db32df96d11e9d874526bbfc4bb39167aef975c9dd73f35b4198873d17c0543bd44379df754afccdb3ffa66d8cee7d3171022999f06b60abf7543023ff5b73fa60e58941afdcef35823045f727ac59f8fee8d234b2765443e2aae99c2e211cd5aad3f41a2fec6c6819a7f82d59e76bdf5c6262a063cba586afa6fd428058c6be3d71bb65c37ad7969ca397ecaa101e8e046dd3076f9f1eabe220e3f99a258c7e324423fc8fe7acfc8525e58168d1cecabf8d57c79e8600e6ca4add4a5730af44121ba94618d0fcd5af47412b48de4576ab91e09ca8327c26fd8becf50196eef32e7a985ab008d3e5a15fc43aa7b2e8258a34e37bea0c16c95777ce48acaba1dfde183855545a11f64861e7c23a84df6d333b99413826f01cbfa64dab4b63579e11a76c122aa2917693e8d2336a36352c1d57295b84c9932eb5814c948299fe62454fca7c5a42f7216f9b668c251325bd97d8063291a466d17f26aa199bab6a11a150e47bb18a9542f2f522addcb4e15d", 0x102a}, {&(0x7f0000002240)="55ed2154ecc42cff747d924885703966986b4787377df317485f24a05cec8bcb254637834e973a03c3109b7b1b6ffd3360564aaeb187c852feb7698ca15851c22193b6489697636814aa8b798ff55154112ccadb113dcae164683bb989c000e73785913a2e8ef8a17d379b4a1c42f4defe8980f5212984916180437cd53f9ca35a0ca1bd7cd73b89ce3f528f66996884ff5bbc4ec3539da6169df8dad87c4ab6ef4c77371852d9a4bfbf5f", 0xab}, {&(0x7f0000002300)="0c2655ef4161652de247c61667b41879f5eeee9725ffdf4ecc4fd123fde007db2b1e0a5b0f145c14074b179c44ba813ec0d7f5750a29925fedca830274545887def4d59d77906484188b15ee329e926b9b8a6b484adc96df8dee5954a80d1d56d2d40ea80847301ea3c2d1931b1a8dab2b35b24bfcae3531f2bcf5bb527fe1f574c8e3e69a72589211", 0x89}, {&(0x7f00000023c0)="0d682f1a156ac04fd47b1fb4b061", 0xe}, {&(0x7f0000002400)="1484f58974c17c06b1a87b20a518f09ac0fbbf3a497cbe", 0x17}, {&(0x7f0000002440)="f910fe93dabc7e9b33aa9d1559a166e5018312d069a30464c33b2137e5f55f51848c25f52d25c92b7c3cdf24b2d360fbed92a04d4917e82b0a31542e10794a533026a416b5bba4bcf860445115d8f56a5c75d633a66c5ba7ba6e8d8e27be0b21f384aae54d174e7f625740461f466a11faf71367a11fd3904f1d5767e9a185bfedf5a3f349196bb70c2bb6d88c64fe570cf7487b8cd659f5b84c189b88869c1a986893762104fcf6093ae33716e929bbae18e242b4659e557f3e940f9288757a6bb8e5fbf78337d933f9d78115a39bbfdc9d04e7974cc912ca", 0xd9}, {&(0x7f0000002540)="1a1bc690b0bb6d9f42a23c1eb166aaed5a4e36c16e7e2dbc856138e16ba1de61e3d1f276d57b9522ab381f303526d3b5c345bc", 0x33}, {&(0x7f0000002580)="585db77b196b26ffcfe34ddcf0fd1f0447", 0x11}], 0xa, &(0x7f0000002680)=[{0xe8, 0x10f, 0xbe, "8bdc5fbac6227d3e5e73dafa69f75e56a64bd8c2a6dd7d5f4280f9eb8b881d118a0c516e4464bde097c9e24f078363fef30dcff0889d9b996c170e1cdf35a584e62a28c9ed8d1b06b14ce8ddc2414d84c653ba31866df8d31db2243764d85d930b41eb23f2e801c31b034fc37c5031b1b708daae6be201dea208dde9ebcafddf2faaded61d76ebf8297a5d15c97787feea0640956d7a819e49f01ea7e48a82b6cf8240b204769a0bee4c8c3e35faada720065beba551f1be9e45abab7f4ba83cd15bd1e034a7ba3bd1f23736e4164e5dd88164937e8f"}], 0xe8}}], 0x3, 0x1) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r6}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r6, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00', r6}) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r7, 0x0, 0x482, &(0x7f0000000000)=""/127, &(0x7f00000001c0)=0xffffffffffffffb9) 03:41:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="4e236702abd0a35ad2cd233d0a661bc2", 0x10) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:49 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:50 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:50 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0xfffffffd, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:50 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x301600, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e30, 0x0, @loopback}, 0x1c) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000160001ebffffffffffffff0000000000"], 0x14}}, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2203) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300)=r6, 0x4) prctl$PR_SET_ENDIAN(0x14, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="5000000000000000e82900000000000000000000000000000000000000000000002003000000a40000006e7100000000000005000000000000006b0500000000000003000000ff0f00006e71000000000000"], 0x50) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @empty, 0x4e23, 0x0, 'nq\x00', 0x10, 0x28, 0x49}, {@loopback, 0x4e21, 0x2000, 0x0, 0x7, 0x5}}, 0x44) write(r0, &(0x7f0000000600)="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", 0x200) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, 0xa64) sendfile(r0, r1, 0x0, 0xfffc) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_int(r8, &(0x7f0000000440)='pids.max\x00', 0x2, 0x0) fsetxattr$security_ima(r9, &(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)=@md5={0x1, "cc8902a21a5a40bf681d0240e5b73b80"}, 0x11, 0x4) 03:41:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) fcntl$notify(r3, 0x402, 0x4) close(r0) 03:41:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000000)=""/2) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r1) 03:41:50 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:50 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000000)={0x1f, 0x4, 0x6, 0x72ca, 0x0, 0x3f, 0xd3, 0x6, 0x2, 0x80}) 03:41:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000340)={0x5, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000000)) close(r1) 03:41:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0xfffffffc, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'teql0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="ef6147e17dcaff0dc5d23db569e45a71eb8241232cff0000"]}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0xfffd, 0x0, @ipv4={[], [], @multicast2}}}}, 0x108) close(r0) 03:41:51 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:51 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:51 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0xffff, 0x7, @local}}}, 0x108) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/17, 0x11}) close(r0) 03:41:51 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:52 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:52 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:52 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) prctl$PR_GET_SECUREBITS(0x1b) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1}, 0x40000002) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x1, 0x0, @mcast2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:53 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:53 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x100) pipe(&(0x7f00000001c0)) getpid() ptrace(0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x6, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)=@random={'system.', '}(posix_acl_access-\x00'}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) rmdir(&(0x7f0000000080)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$unix(0x1, 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x262) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) accept(r2, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 03:41:53 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:53 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2871.861009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=45793 sclass=netlink_route_socket pig=27832 comm=syz-executor.2 03:41:53 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="056352402d6af30440000000000000"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup2(r2, r0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000700)=[@acquire], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400203) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x44, 0x0, &(0x7f0000000380)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:41:53 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x4000000, {{0xa, 0x2000, 0x9, @mcast1={0xff, 0x7}, 0x4000000}}, {{0xa, 0x0, 0x6, @loopback, 0x2}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b8cc2e1a5d63367, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x800, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2872.171255] audit: type=1400 audit(2000000513.770:12274): avc: denied { set_context_mgr } for pid=27837 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:41:53 executing program 0: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x100, 0xb5481f3e129391aa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @random="208ad9019612"}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="1004000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74b", 0x329, 0x5db0ef4e77e948cf, 0x0, 0x320) r2 = socket(0x80000000000000a, 0x2, 0x3f) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80002, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) r6 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGRAB(r8, 0x40044590, &(0x7f0000000040)=0x4) 03:41:54 executing program 1: unlink(&(0x7f0000000040)='./file0\x00') close(0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000080)=""/31) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000005c0)=ANY=[@ANYBLOB="08000000003600000000000000000000beb4c774236d"]) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r3, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r12, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYRESHEX, @ANYRES16=r12], @ANYRES32=r7, @ANYBLOB="08cbfdcdbc449b3a"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="00000900e5ff0b00f1ff1e00080005003f0700000800050006f80000080001006d710000"], 0x40}, 0x1, 0x0, 0x0, 0x40000c1}, 0x20008002) r14 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) sendmmsg(r14, &(0x7f0000007e00), 0x9fbb952603ff9c, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r15, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) readv(r15, &(0x7f0000000540)=[{&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000480)=""/17, 0x11}, {&(0x7f00000004c0)=""/82, 0x52}], 0x5) setitimer(0x6, &(0x7f0000000280)={{0x77359400}, {0x0, 0x7530}}, &(0x7f00000002c0)) [ 2872.716789] audit: type=1400 audit(2000000514.320:12275): avc: denied { set_context_mgr } for pid=27857 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:41:54 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, 0x0, 0x20, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20018010}, 0x40000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:54 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x3fd, @mcast2, 0x80000000}, {0xa, 0x4e24, 0x4, @local, 0x4}, 0x5, [0x40, 0x9c61, 0x4, 0x580, 0xffff0000, 0x1, 0xfff, 0x3999]}, 0x5c) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='auxv\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x5, 0x8000, 0x3, 0x4, 0x6, 0xd}}, 0x50) 03:41:54 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r7 = dup(0xffffffffffffffff) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r7, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2873.402106] audit: type=1400 audit(2000000515.000:12276): avc: denied { create } for pid=27877 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:41:55 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendfile(r4, r1, &(0x7f0000000340)=0x7, 0x3) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000000)={{0x0, @loopback, 0x4e20, 0x3, 'dh\x00', 0x10, 0x0, 0x6}, {@multicast1, 0x4e20, 0x10000, 0x8, 0x3ff, 0x100}}, 0x44) 03:41:55 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r7 = dup(0xffffffffffffffff) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r7, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:55 executing program 0: r0 = socket(0x80000000000000a, 0x4, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000000)={'ip6gretap0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}) 03:41:55 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1800007, 0x11, r2, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) creat(&(0x7f0000000140)='./bus\x00', 0x0) [ 2874.187517] audit: type=1400 audit(2000000515.790:12277): avc: denied { create } for pid=27877 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:41:55 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r8, r9, 0x0, 0x8000fffffffe) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:56 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f00000000c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x10, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}, @window={0x3, 0x3}, @exp_smc={0xfe, 0x6}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "00000000000000000000000701000080"}, @md5sig={0x13, 0x12, "00efb3d0ceb3a8d98f5d9ffd47fdc19a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 03:41:56 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r7 = dup(0xffffffffffffffff) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r7, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:56 executing program 2: r0 = socket(0xa60bf2ea5f7c66f7, 0x2, 0x28) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x3, 0x1, 0x8) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = gettid() r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) write$binfmt_elf32(r4, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x20, 0xff, 0x6, 0x7, 0x3, 0x6, 0x5, 0x153, 0x38, 0x393, 0x5, 0x0, 0x20, 0x1, 0xe6c, 0x81, 0x3ff}, [{0x6, 0x1, 0xffff8000, 0x1, 0x748, 0x8, 0xffffff3e, 0x2}], "c71d3024bd3185dc13f30c820a53b90e53276a3929282ad33ad601556267257d66da27dbce89a422edf97795fcf916d649bb53584cf776d43a25b053f2f600a3ae7932e96db300cdcda584ecffc6992bd0dfe7ffb8a0d3b63f8cd70524c9548f76d18349117b895d409b16a1ea9fee26200f4aa3f2950d85dca9cebef43ffecb9df08207d9cfae2b3f8622bf726cc99cf4efe35269ee7310905ede06c380fb81f5ad269028777db701735407ae", [[], [], [], [], [], []]}, 0x705) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)=ANY=[@ANYBLOB="14001e00160001040000000000000000000000fdfc4aa5eec093e216af5eebb6066e30aeca476bb8320a21627da79135a48af9cad953b8cba9cac472b8a3021a82d7e211f994dcdd09bb6035b74d513a908983a29e896c89668783393da600"/107], 0x14}}, 0x0) write$binfmt_script(r6, &(0x7f0000000700)={'#! ', './file0', [{0x20, '/)!*)r'}, {0x20, 'security-,selinux\xcc'}, {0x20, '+'}], 0xa, "046becf0029dba125b83bd012d43eebfab553430a706d9a937d54d1a06baa592787d9c9d0fcbe3e8550ca40529ca513ca71aba62b6fe2ce90a9e7fa698389e5c279908bdf548c981db396dcf8c3f93b8d51a551108bd9aaac0cec42c3f69553618c4affe874c5c2e59b48570bc1e8503ec32d4277845255424654c0f2d249da3fa070e4cf721210a9a43617f57d94ed62079ad40f773d996841b6d8cd78064adb3a81d788dba65b9f2cdfd"}, 0xd2) r7 = getgid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r8, 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) accept4(r8, 0x0, 0x0, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r3, r5, r7}, 0xc) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1, 0x5}, @timestamp, @sack_perm, @timestamp, @mss={0x2, 0x487}, @timestamp, @sack_perm], 0x7) socket$netlink(0x10, 0x3, 0x0) 03:41:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000104c0)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='.\x00', 0x20060, 0x29) 03:41:56 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x0, &(0x7f0000000840)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utimes(&(0x7f0000000140)='./file0\x00', 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) dup3(r0, r1, 0x0) 03:41:57 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000001c0)=0x68) ptrace$setopts(0x4206, r2, 0x1, 0xc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:41:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) 03:41:57 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r10, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:57 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r3 = dup(0xffffffffffffffff) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r3, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f0000000000), 0x12) syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') write$binfmt_misc(r1, &(0x7f0000000cc0)=ANY=[@ANYRESDEC, @ANYRESOCT, @ANYRESDEC, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="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"], 0xfffffeed) splice(r0, 0x0, r2, 0x0, 0x2a, 0x0) [ 2875.852728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8198 sclass=netlink_route_socket pig=27956 comm=syz-executor.2 [ 2875.961352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=27959 comm=syz-executor.2 03:41:58 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'bcsh0\x00', @ifru_ivalue=0x5}}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0xc8b6, 0x15, @loopback}}, {{0xa, 0x0, 0x0, @remote, 0x100000}}}, 0xfffffffffffffee4) close(r0) 03:41:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) r0 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x800000000000055, 0x0, 0x0, [{}]}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x800) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "06f47fbd1a42c77d", "13a5ee1bddadc64ac152611908e170bf4aa0cc90b445d3319348216c5d0ab73f", "3c47f24d", "6599decd16c617b0"}, 0x38) 03:41:58 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:58 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0xfffffffd, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) clone(0x0, &(0x7f0000000340)="b87c81a67dfc214fee87a4c0632564c5791a875c4753f95b1ea0d1de292c6822761098cc6c66de891149267127a9b03d702a44603d1226909dd514baa3c7f874d2a770df34ff8b74575a916fe7eb5242dcb968145ed66a67306b2c540e856ae7483e0ca0accf493b7f7f35232fe644fdcb13522cc2376ab5c4ba923b080e7ae71e4636d876935ed6901cbab23b08aa95e73c455a219e6e1e2745f7d67dc5a1ab34f1af95382e181f7529b86f808fa85be1c7a5a3", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000400)="9d39d5cf48d1b647ab59010f98d0c82954bdf3b960a667bc0f8069e4abe324fba1141108c2ef986adf274748bcd9988c6aaa4b252282fc95686683eba15e3de0b62eef089f7307d558c8b41b34f3e665c23b7acd906050d56dd87b254f") close(r0) 03:41:58 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:58 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x5, @loopback, 0x3}, {0xa, 0x4e22, 0xe799, @empty, 0x9}, 0x1, [0x8, 0x10, 0x5, 0xe0, 0xfffffffd, 0x6, 0x900000, 0x3f]}, 0x5c) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000004c0)={0x1, 0x0, 0x1000, 0x8a, &(0x7f0000000340)="49bf1f35886d3fb86f39c1af544c917d87a08374632802361682d518d98c0f98f8acfc8ad419a1d05845669e44b11a02d53c444c6da7559a53a85103d1ca1528f8a94542d18a9f6e6c8f2678cf51727e49a9f12cec3cdc2717bd98655aef336b3a4a906534a4553d5705b925c3714ca956087c0fcf77d27c5a75c7948c8de32d708a3f579f6d03266b27", 0xbb, 0x0, &(0x7f0000000400)="e1faaf52960347964e760d56de01f081bf2ec7db0a725492c78881cf26df736d156270e02ec8a06f628c853470ac7bae60321f088e4aa7fbf176cb326f879a11ca36781b69be200746331b3ce83348842874b4786e4e0a7a20cecf2370117c7093383a876f329d39766214631655eb747625fe9fe10fe020c9953058887f21d9854bb0010c83a7e09d0670f324e8323e4a925d9a233d6c08ccd9bf118641218760b5a296eee392cac24b34e31a7de95a9eb401735a2c4da8ccf21c"}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(0xffffffffffffffff) 03:41:58 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:58 executing program 4: 03:41:59 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:41:59 executing program 4: 03:41:59 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}}}, {{0xa, 0x0, 0x0, @loopback, 0x4}}}, 0x108) fallocate(r0, 0x1, 0x5, 0x4) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) getgid() INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes [ 2882.643392] audit: type=1400 audit(2000000524.240:12278): avc: denied { create } for pid=28039 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2882.669345] audit: type=1400 audit(2000000524.270:12279): avc: denied { write } for pid=28039 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2882.714809] audit: type=1400 audit(2000000524.320:12280): avc: denied { read } for pid=28039 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 03:42:08 executing program 1: 03:42:08 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000000000)=0x80, 0x4) close(r0) 03:42:08 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:08 executing program 4: 03:42:08 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:08 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000480)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x1, {{0xa, 0xfffe, 0x0, @remote}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r4 = socket(0x80000000000000a, 0x2, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0xc1) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x45a, @broadcast}}) close(r0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r7, r5, 0x89e04a7036747026, 0x1}, 0x10) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x22000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) readahead(r10, 0x0, 0x1) ioctl$KDADDIO(r9, 0x4b34, 0x8) 03:42:08 executing program 4: 03:42:08 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x8000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x5, @loopback, 0x3ac1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x20, 0x4, 0x1}, 0xdde}}, 0x18) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000001c0)={0x3, @broadcast, 0x4e21, 0x4, 'wlc\x00', 0x1, 0x1000, 0x29}, 0x2c) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:09 executing program 0: 03:42:09 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) r8 = dup(r7) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r8, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:09 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x9, r0, 0x0, 0x0) 03:42:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 03:42:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 03:42:09 executing program 2: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff}, 0x10c400) readv(r0, &(0x7f0000001900)=[{&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/75, 0x4b}, {&(0x7f0000000500)=""/252, 0xfc}, {&(0x7f0000000600)=""/222, 0xde}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/97, 0x61}, {&(0x7f0000001780)=""/236, 0xec}, {&(0x7f0000001880)=""/89, 0x59}], 0x8) r1 = socket(0x1, 0x2, 0x5d) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) splice(0xffffffffffffffff, &(0x7f0000000000)=0x8, r1, &(0x7f0000000040)=0x10000, 0x2, 0x4) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0xfffffffffffffe93, &(0x7f0000000080)={&(0x7f0000000040)={0x14e, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x4010, r3, 0x6866f000) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_tables_matches\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000001980)='TIPCv2\x00') ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000400)=0xffffff80) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x0) keyctl$clear(0x7, r5) r6 = request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='-securityvboxnet1\x00', r5) r7 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="97", 0x1, 0xfffffffffffffffb) r8 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000380)="9698dbb56dd68937e5d2369b6932562c029e43409ccf5a90ad2df62fe1bf8994cb96c94632d20745ecae0c794767eff894c9c8b1364d6b6572e027be622949c82c235d02561a23c30a2b42303c03809154b37a1fa4aed60379bbb8b0f2d7976a5497c08ddbaa0091592d02979206791ded742bc74dfa1a057aca0b35c72b202cd1f45e6c9c35dbe9362a659dc3314632f8c7dbcb4ffc7693bc2976a24f3a02138e49ad43efb5762927789ef1", 0xac, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r6, r7, r8}, &(0x7f0000000440)=""/45, 0x2d, &(0x7f0000000680)={&(0x7f0000000480)={'nhpoly1305-avx2\x00'}}) keyctl$set_timeout(0xf, r6, 0x7b) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) write$P9_RMKNOD(r9, &(0x7f0000000340)={0x14, 0x13, 0x2, {0xc, 0x4, 0x7}}, 0x14) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x300, 0x0, 0x0, {0xa}}, 0x1000}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r13}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r13, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000001a80)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x605a10}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)=@deltfilter={0x30, 0x2d, 0xeb0a576f609a4426, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r13, {0x1, 0x3}, {0xb, 0xd}, {0x0, 0x1ffe9}}, [@TCA_RATE={0x8, 0x5, {0x7f, 0x81}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000010) close(r1) 03:42:09 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r7, &(0x7f0000000000), 0x1c) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:09 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:09 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) setresgid(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @multicast2}, 0x10) 03:42:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 2888.609705] audit: type=1400 audit(2000000530.210:12281): avc: denied { create } for pid=28321 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:10 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) getpgrp(0x0) r0 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/dev_snmp6\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0xf292970b90c98047, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x10001) r3 = eventfd2(0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000100)={0x0, 0x16, "c92ae427853c5563c2ef5ebf761da29950bbc1fe3941"}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) 03:42:10 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x800000003, 0xff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:10 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2888.831788] audit: type=1400 audit(2000000530.430:12282): avc: denied { write } for pid=28321 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:10 executing program 1: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') [ 2889.370572] audit: type=1400 audit(2000000530.970:12283): avc: denied { create } for pid=28321 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:11 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x800000003, 0xff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:11 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bcsh0\x00', 0x4}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x1000, 0x0, @remote}}}, 0x108) close(r0) 03:42:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = socket(0x0, 0x803, 0xff) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x28000}, 0xffffff13, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="ffffffe8", @ANYRES16=r3, @ANYBLOB="00032cbd7000fddbdf25030000000800050000000000000002000000000014000100fe880000000000000000000000000001ddfe0100fe8000000000000000000000000000bb08000500010000006c00030001010000"], 0xfe5c}, 0x1, 0x0, 0x0, 0xb0}, 0x2004000) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="beffffff", @ANYRES16=r3, @ANYBLOB="e6012cbddec447bc4670e8000000000000000000"], 0xfffffffffffffee1}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x2) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@fat=@errors_remount='errors=remount-ro'}]}) 03:42:11 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2889.895032] audit: type=1400 audit(2000000531.500:12284): avc: denied { create } for pid=28360 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:11 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/validatetrans\x00', 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RREADLINK(r8, &(0x7f0000000080)={0xe, 0x17, 0x2, {0x5, './bus'}}, 0xe) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r2, 0x0, &(0x7f0000000300)) fallocate(r0, 0x3, 0xc004, 0x8020003) [ 2889.960571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28369 comm=syz-executor.4 [ 2890.093348] FAT-fs (loop4): bogus number of reserved sectors 03:42:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x20, 0x2, 0x22, 0x4, 0x2, 0x3e, 0x3, 0xa0, 0x40, 0x22a, 0x1000, 0x0, 0x38, 0x1, 0x8, 0x9, 0x25c}, [{0x7, 0x3f, 0x401, 0x9, 0xac71, 0x7, 0x81, 0x5}], "ed8d9e335532b4463601fe89d08ddeaadaaa38dc30538c9f73d8ab682e8cfd1a544547d988124d662c4ab138536b4f48d9d6ba5adedfefdbf7fb9f8313eb", [[], [], [], [], [], [], [], [], [], []]}, 0xab6) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x0, 0xfffffffffffffffd}, 0x20b) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000000), 0x4) r4 = socket(0x11, 0x800000003, 0x81) bind(r4, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = accept$inet(r4, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x3, &(0x7f0000000340)=""/30) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}}}, &(0x7f0000000300)=0xe8) [ 2890.093354] FAT-fs (loop4): Can't find a valid FAT filesystem 03:42:11 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x800000003, 0xff) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2890.319749] audit: type=1400 audit(2000000531.920:12285): avc: denied { write } for pid=28360 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:12 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2890.549638] audit: type=1400 audit(2000000532.150:12286): avc: denied { create } for pid=28360 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:12 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:12 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/psched\x00') ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000003c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="23be68d373c8000000001250d3a10fd630600000ad44a335b696b6868313b60e0cf59e7a188a1927f461a393bdbf399be67cd1f1f837cd91571c89c96997b4a45f1da580d680aa8690cb750472de2b439639cca69f50ce6d1892bcb3a37688466081b85fc519cb"], 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f00000005c0)) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) [ 2890.667093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28393 comm=syz-executor.4 03:42:12 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) shutdown(0xffffffffffffffff, 0x3) get_thread_area(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000240)=@get={0x1, 0x0, 0x100}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0xffd8) pipe(0x0) syz_open_pts(0xffffffffffffffff, 0x141900) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x36a) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) syz_genetlink_get_family_id$nbd(0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) open(0x0, 0x40c5, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="3a0000001000050700000000000000280000000063bc46e21af675687a24c866ce946f8ab0db5a48e7afbcaad9ae8e926f064e476791dcf7d5889d5753e6ce935a7da8d8cfe16c475ad7c3a482360768de1e95f80e02f686c9101b32fc0178f7ace02b8bf7748efd316d8fca6a461d4af54cacfa6046c7a8508a1ae23af13abbf36c86051aea9c9ac52e5d66b312059482796c0ca56caffae8cbb76e192f8534947423e68574e3", @ANYRES32=r4, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r4], 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r4, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@mcast1, r4}, 0x14) ioprio_set$uid(0x3, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='\x00', @ANYRES32=r7, @ANYBLOB="08000200e000000208000400ac141400"], 0x28}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x804) 03:42:12 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) add_key(&(0x7f0000000200)='.dead\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1000, 0x1) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) 03:42:12 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:12 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000000)={0x6, 0x7fff, 0xa3, 0x4, 0xfff}) close(r0) 03:42:13 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2891.412345] audit: type=1400 audit(2000000533.000:12287): avc: denied { set_context_mgr } for pid=28412 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 2891.673274] audit: type=1400 audit(2000000533.270:12288): avc: denied { create } for pid=28408 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:13 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000680)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xc0040, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) preadv(r0, &(0x7f00000017c0), 0x1a0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) pipe2(&(0x7f0000000140), 0x80000) [ 2891.913169] binder: BINDER_SET_CONTEXT_MGR already set [ 2891.922556] binder: 28412:28421 ioctl 40046207 0 returned -16 03:42:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) 03:42:13 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:13 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:13 executing program 0: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x65ab, 0xc, 0x0, 0x27) 03:42:14 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000100000000000a00000000000008fe8000000000000000000000000000aa810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008c53805000000000000000000000000000020000000a00000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff200000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000000156b1c5555eef5e3f42037b09b21d5dafeffffff00"/400], 0x190) perf_event_open(&(0x7f000001d000)={0x1, 0x599, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000058) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r3, 0x0, 0xc, &(0x7f0000000000), 0x0) r4 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0xfffffffffffffef7, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000040)) getsockopt$inet_opts(r3, 0x0, 0x0, 0x0, &(0x7f0000000080)) 03:42:14 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:14 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x75, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x1320, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x4001, @mcast2}}}, 0x108) close(r0) 03:42:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000006680)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/43, 0x2b}, {&(0x7f00000000c0)=""/205, 0xcd}, {&(0x7f00000001c0)=""/184, 0xb8}, {&(0x7f0000000280)=""/54, 0x36}, {&(0x7f00000002c0)=""/187, 0xbb}, {&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f00000003c0)=""/218, 0xda}, {&(0x7f00000004c0)=""/187, 0xbb}, {&(0x7f0000000580)=""/134, 0x86}, {&(0x7f0000000640)=""/70, 0x46}], 0xa, &(0x7f0000000780)=""/235, 0xeb}, 0x7f}, {{&(0x7f0000000880)=@alg, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000900)=""/248, 0xf8}, {&(0x7f0000000a00)=""/254, 0xfe}, {&(0x7f0000000b00)=""/250, 0xfa}, {&(0x7f0000000c00)=""/29, 0x1d}], 0x4, &(0x7f0000000c80)=""/37, 0x25}, 0x3f}, {{&(0x7f0000000cc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000000d40)=""/217, 0xd9}, {&(0x7f0000000e40)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/214, 0xd6}, {&(0x7f0000002f40)=""/50, 0x32}, {&(0x7f0000002f80)=""/20, 0x14}], 0x6, &(0x7f0000003040)=""/55, 0x37}, 0xffffff13}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000003080)=""/124, 0x7c}, {&(0x7f0000003100)=""/35, 0x23}, {&(0x7f0000003140)=""/229, 0xe5}, {&(0x7f0000003240)=""/76, 0x4c}, {&(0x7f00000032c0)=""/28, 0x1c}, {&(0x7f0000003300)=""/54, 0x36}, {&(0x7f0000003340)=""/100, 0x64}, {&(0x7f00000033c0)=""/224, 0xe0}], 0x8, &(0x7f0000003540)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004540)=@x25, 0x80, &(0x7f0000005780)=[{&(0x7f00000045c0)=""/1, 0x1}, {&(0x7f0000004600)=""/70, 0x46}, {&(0x7f0000004680)=""/240, 0xf0}, {&(0x7f0000004780)=""/4096, 0x1000}], 0x4, &(0x7f00000057c0)=""/142, 0x8e}, 0x4bf4f156}, {{&(0x7f0000005880)=@sco, 0x80, &(0x7f0000005f40)=[{&(0x7f0000005900)=""/200, 0xc8}, {&(0x7f0000005a00)=""/55, 0x37}, {&(0x7f0000005a40)=""/227, 0xe3}, {&(0x7f0000005b40)=""/127, 0x7f}, {&(0x7f0000005bc0)=""/150, 0x96}, {&(0x7f0000005c80)=""/253, 0xfd}, {&(0x7f0000005d80)}, {&(0x7f0000005dc0)=""/186, 0xba}, {&(0x7f0000005e80)}, {&(0x7f0000005ec0)=""/126, 0x7e}], 0xa, &(0x7f0000006000)=""/180, 0xb4}, 0x6}, {{&(0x7f00000060c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000006200)=[{&(0x7f0000006140)=""/23, 0x17}, {&(0x7f0000006180)=""/19, 0x13}, {&(0x7f00000061c0)=""/15, 0xf}], 0x3, &(0x7f0000006240)=""/157, 0x9d}, 0x6}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f0000006300)=""/84, 0x54}, {&(0x7f0000006380)}, {&(0x7f00000063c0)=""/187, 0xbb}, {&(0x7f0000006480)=""/185, 0xb9}], 0x4, &(0x7f0000006580)=""/235, 0xeb}}], 0x8, 0x100, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x3, &(0x7f0000006880)={@rand_addr, @local}, &(0x7f00000068c0)=0x8) set_robust_list(&(0x7f0000006940)={0x0, 0x722, &(0x7f0000006900)}, 0x18) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000006980)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000069c0)={{0x3c, @rand_addr=0x3, 0x4e22, 0x0, 'ovf\x00', 0x1, 0x6, 0x6c}, {@loopback, 0x4e23, 0x10000, 0x60b9, 0x3, 0x2}}, 0x44) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000006a40), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000006a80)={0x8, 0x9, 0x6, 0x6, 0x1, r2, 0x7, [], 0x0, r3, 0x5, 0x2}, 0x3c) pipe2(&(0x7f0000006ac0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2400) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000006b00)=0x200) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000006b40)=0x0) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000006b80)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r8, 0xc0505405, &(0x7f0000006bc0)={{0x3, 0x1, 0x7, 0x0, 0x6}, 0x7, 0x1, 0x81}) getxattr(&(0x7f0000006c40)='./file0\x00', 0x0, &(0x7f0000006c80)=""/189, 0xbd) open(&(0x7f0000006d40)='./file1\x00', 0x2080, 0x200) r9 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_TREAD(r9, 0x40045402, &(0x7f0000006d80)) sysinfo(&(0x7f0000006dc0)=""/116) getsockopt$inet6_mtu(r8, 0x29, 0x17, &(0x7f0000006e40), &(0x7f0000006e80)=0x4) r10 = accept$inet(r6, &(0x7f0000006ec0), &(0x7f0000006f00)=0x10) fsetxattr$security_evm(r10, &(0x7f0000006f40)='security.evm\x00', &(0x7f0000006f80)=@sha1={0x1, "15496c90a52f5731645fa76d40bbff85bdf41a81"}, 0x15, 0x2) fsetxattr$security_ima(r4, &(0x7f0000006fc0)='security.ima\x00', &(0x7f0000007000)=@md5={0x1, "4c10bd1e88fd91eeb01a3f1642bb4050"}, 0x11, 0x3) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000007040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000007080)='/dev/vga_arbiter\x00', 0x800, 0x0) sendto$inet6(r11, &(0x7f00000070c0)="f07d537c6a", 0x5, 0x40, 0x0, 0x0) r12 = syz_open_procfs(r7, &(0x7f0000007100)='stat\x00') ioctl$KDSETLED(r12, 0x4b32, 0xb006) setsockopt$IP_VS_SO_SET_ADDDEST(r12, 0x0, 0x487, &(0x7f0000007140)={{0x3b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x3, 'none\x00', 0x25, 0x7f, 0xc}, {@rand_addr=0x5d, 0x4e24, 0x2000, 0x7, 0x5, 0x2}}, 0x44) r13 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000071c0)='io.bfq.weight\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r13, &(0x7f0000007200)='security.SMACK64\x00', &(0x7f0000007240)='/selinux/mls\x00', 0xd, 0x2) 03:42:14 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:14 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='NET_DM\x00'}, 0x30) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mprotect(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000093000/0x1000)=nil) mprotect(&(0x7f0000006000/0x4000)=nil, 0x4000, 0xe) 03:42:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route(r4, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@bridge_getneigh={0x28, 0x1e, 0x200, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, r7, 0x1, 0x1}, [@IFLA_PROTO_DOWN={0x8, 0x27, 0x78}]}, 0x28}}, 0xc3bccbdca8bde28a) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r8, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r8}, 0x14) 03:42:15 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400), 0xa) 03:42:15 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2893.897607] audit: type=1400 audit(2000000535.500:12289): avc: denied { execheap } for pid=28493 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 03:42:15 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:15 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x4) ftruncate(r1, 0x208200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x400e0b7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xa) 03:42:15 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0xfffffffd, @mcast1={0xff, 0x7}}}, {{0xa, 0x80, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4, r2}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r5 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r7 = socket(0x100000000011, 0x2, 0x0) bind(r7, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r9 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000080)={r10, 0x1, 0x6, @broadcast}, 0x17) r11 = socket(0x100000000011, 0x2, 0x0) bind(r11, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(r9, 0x107, 0x2, &(0x7f0000000000)={r12, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r6, @ANYRES16=r4, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e00000008000400ffff000008000600", @ANYRES32=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r13, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1d}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) accept$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r19}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r19}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r18, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r19, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@can={0x1d, 0x0}, &(0x7f0000000480)=0x80) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r23}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r23, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[@ANYBLOB="000000001000050700000000000000000000000075dac329a23e2bda5e93965bc5be6c21253d12afdcaf0fe1f1d62ad41d9622dc157931fd892df3945e6dc67bc3ec08cc023028cb70ac4b8eec1384a818a33ceb730079d34f9140277c2e58a53eafa1e9d5cbd28a672525fb1585d0a690f04e4ee406081952de911448aaba6759fa9d6e", @ANYRES32=r26, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r26], 0x38}}, 0x0) sendmsg$nl_route(r25, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r26, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r29}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r28, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r29, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)={0x1d0, r4, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r16}, {0xc8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r20}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r23}, {0xe4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x80, 0x81, 0xff, 0x8000}, {0x6, 0x5, 0x0, 0x6}, {0x9, 0x6, 0x81, 0x7}, {0x1, 0x7f, 0x6, 0x44d3}, {0x7, 0x5, 0x4, 0xffffffff}, {0x6651, 0x40, 0x5d, 0x81}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}, {0x8, 0x6, r29}}}]}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x20048012}, 0x8049) r30 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r30, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r30, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r31 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r31, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="141c00000d000104000000000a00000000000000b0f03e146b664f5fc897e5f923e70d78ced163bb482f1f0477e2b65d20b120bdb404f1cbb63e9fec9309b1b059b50dc38b7f0038adfa79403c2fe3e9"], 0x1}}, 0x4004082) ioctl$sock_SIOCGPGRP(r31, 0x8904, &(0x7f0000000000)) close(r0) 03:42:16 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:16 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x8d) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @empty}, 0x100, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000040)='ip6_vti0\x00', 0x5b, 0xee8e, 0x2}) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000140)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000880)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000300)={0x518, r3, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xb4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaf3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc25}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x73}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffe01}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x91}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff01}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_BEARER={0x184, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @loopback, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @remote, 0x400}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x5fde, @local, 0xbd}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xf88, @mcast2, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xcce, @local, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @broadcast}}}}]}, @TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x57}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @local, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffb}}}}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x811}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x37}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}]}]}, 0x518}, 0x1, 0x0, 0x0, 0x20000000}, 0x10030) syz_open_dev$rtc(&(0x7f00000008c0)='/dev/rtc#\x00', 0x1000, 0x200100) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000940)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000b80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x82018}, 0xc, &(0x7f0000000b40)={&(0x7f0000000980)={0x1c0, r4, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xee}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd237}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x866d31d8b675c0d7}, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000bc0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x10080000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x6) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d00)='memory.events\x00', 0x0, 0x0) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) r8 = syz_open_dev$rtc(&(0x7f0000000e00)='/dev/rtc#\x00', 0x10000, 0x444000) ioctl$RTC_VL_READ(r8, 0x80047013, &(0x7f0000000e40)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x3) fallocate(0xffffffffffffffff, 0x46, 0x4, 0x20) pipe2(&(0x7f0000002600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) [ 2894.601149] audit: type=1400 audit(2000000536.200:12290): avc: denied { create } for pid=28515 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 sendmmsg(r6, &(0x7f0000006b80)=[{{&(0x7f0000000e80)=@nl=@unspec, 0x80, &(0x7f0000001100)=[{&(0x7f0000000f00)="dd02c8e8e63f861bb1cc37", 0xb}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="abf78e46e395fafabcae6a24745784f17008e3eaee3d7cbd06aa50aa347f532232472d705f045ff78311dac416014c30fa7df8c5a13a5f5ad7f3b5d26d50fb63712382f387a88a447f1e19911a0103c4b60e3e341172e2f28ba092f24a6be305b804b2e986cd9def08505aa29713695ffa87ea99ff4d634a24a5c3a6b5521b2b658b67a1c757b3bf1ad526c68e09e1e4699de5f5acb334047cdc626aa3e9d32338e483c9602d194ff4d49901761f7e43cfad36772394f80096da1242834ec5aa573cdd7302afa63c0d", 0xc9}, {&(0x7f0000001080)="9eb035523067b629e95354f4574876c0f4021d5229", 0x15}, {&(0x7f00000010c0)="88bbf7234c9cff16023aa7bb05a53459a889e2b7281f9b1c3090fe529b5ac65b5f91e0c264607a0537cc6a62d7ec441a6cc96dbe78", 0x35}], 0x5, &(0x7f0000001180)=[{0x68, 0x10a, 0x3, "6c9d80e8d53a0fcf15c3709e8240d53a2ca546cdf8d004bb8d37e4a692611ab40bb1ff76e58b3056e8e39820e15977b4d6fff80b66664583d4cfcd4700cd5b38689116d6aa2415844346173f29cdbad2352a70"}, {0x20, 0x12721b59f9d5949e, 0x100000, "de64d7c11e1405c41c"}, {0x18, 0x1, 0x9, "891c9db82e72d0f4"}, {0xa0, 0x0, 0x3, "beff3c3d3eecfb27842c58c9b49401cf02aec8d47dc1d855e7ef84e9fea410ef1e86b730694648c683e79d59aa6eb90a72a0e0612d6c93c0b6f4e1d1265107f2bc5ca310bb62ca94fda46203bbf971327d33448764ff523a28cfc7fc5d7b00dc884aa236759f2959a306086e012e355cd9f12de8834499615ec01fe00e0c609c263e8accacc4f2d08578fb4c"}, {0xf0, 0x107, 0x4f4, "3fcbf93d19d9965f0f988fffcd8cd1e83666d7e84bc3afcbc21f94db2666c5ef72ae93ad632fdabeca7545d8b131ee0ad7f66f3b6780dea469a6768e45b088d119c9b93b4b50b5b86b8ab88a8b0719689240e1d11aa92e6e0f68353f7b122f651843c8bfcb9aa41da17ce5810f2830e53997a40e7303a4f7a204f441f1d582f5221c61190e3798e26b0ec25b675bd7a34b3aa98fc24ac54139b21dbbd1e7101e37a7b82ed0344814548549fe13624074ebf85dad88bcabdb907fdcf53f2b2bc217f356d854fae751fc7713359b7775ce20cf5ed770be832b4df4fa73"}, {0x1010, 0x101, 0x97d, "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"}, {0x30, 0x10a, 0x0, "8d41ddf4dd50f2ea9749932fb362d3c2640808732cfd1e005d91"}, {0x60, 0x111, 0x9, "9bf42abb5ed82a17cc59110e9bb87d63533af2ac6840fe9159e233febdce8e7d8fd63f9b89ac4b67d73802f28912e64dd13981e7d7971564ca2bdfa531deb495613b935928b4cb4fb1"}, {0xb8, 0xff, 0x80000000, "35e39f178c60858a129e05eff7200d4977abf1ed447ec0a0d7df2cd0d2a408d284d58731e6612199bba03398d9ea26520bda6e538af82833754a16f43e4fa3e15e333079daa58be11bd205420071e4d5af770976fc7140a92c6b508dc210af3b80667ac3dbebd315ee9c9c4655be055d56924a319ad27c024670ec55ec4134802de554a53b8380ce37864176e8a7be601a7e7120c7a8fc285af05de780aa0aa45620e2"}], 0x1388}}, {{&(0x7f0000002640)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x3, 0x3, 0x3, 0x2, {0xa, 0x4e20, 0x1f, @dev={0xfe, 0x80, [], 0x24}, 0x80000001}}}, 0x80, &(0x7f0000003ac0)=[{&(0x7f00000026c0)="14a9c93b6c6cfc43475140b27ee2e3b169895bcd378df60350008a33374513f831ea7083da6cb8368454df9edf0c73cde77ecd3eeeb903e150a00e4963fca9f17d33f4ccab135c1480a8", 0x4a}, {&(0x7f0000002740)="485b74c86d53ffee6b445dfb68af46a0cb978331a08273b2e4598cd2fecbf89c9895ec600c900075a5f976a07763171b583992396b62af32f69409453daddfccb5b8cd11243e81731e4e0f8e101e070bd7d55b72570e3a49d49780623c880550b8ee33e5715a006fc10b55f713e5be1899de09ce018e45999b055b30f00f4f7f39c051", 0x83}, {&(0x7f0000002800)="cf63704e088d93f32a0284e0ff9ccd6a02d5350b613d6fc2b790dafc8ebd3fe4e0782d3f690e80e49c6af980c00fe5796e98c3448b51424e6c06f7321794b09df4f7cb45265b13ab51c11a9a6114bcc34e7aa0cef495a9e3bd32f414a275c1c0af1f6418039e5c8ce191681f591ab8b84f26c65118451bccedee95db5d86df6f8725d3c72864314def90193595e0d61615f5aeb8e892df08c6d200502296d0a5726ad3f2a3037df0b93d1b5836c43f3861d21aadccfb76fe94fd7c7ad24dda9ffb881d1de7141fac0169c5deeb435c3a33bfc2c22f6dc24197e1b163b676455d503abab96c2fd946ff", 0xe9}, {&(0x7f0000002900)="975f51c2e8c2807047d65e8ea999046df3f76b9ed59b57a163b1c23a40ea51b6c3980b5d3ebba5a5ce3673e898668604af36220ee1eb7cf36b7cbce1e37f38d625e9ad9dcc602337e3c02f62626e2e173848d1c15e9dcbab0299defd73bcf717be101806b9bd0b3ab133a0ceb8b888b3d03c30e2fd1bd1c916af32ac7cdcccd403946ba2a45b58bf351578627d5ade4b06b488f3e9718ceb4cef3f768cfb8fdfef074f1bdcf422170f7aa4e4ccd174ca9e1f3ca44ea2ebb109e91d123f0ce6f9810c075380de220976f7e31ccfc5b0e840b4927e271bd5fcfe6d0abf6291a76df80642a64a0ee5329d8f76382f49c539a659975b299f0420be", 0xf9}, {&(0x7f0000002a00)="e26279359557f8b8", 0x8}, {&(0x7f0000002a40)="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", 0x1000}, {&(0x7f0000003a40)="240ffa28cb71c9229c188e4d6374b336ef4758220be805244c0abb82bdabe1e04477a94a216b05be256f111732e083006393157fd2fb53d721", 0x39}, {&(0x7f0000003a80)="ae6060bd8febef51695a18113978c400db392de24257d456e2186750266ab76a4d96d36d2dc2c609", 0x28}], 0x8, &(0x7f0000003b40)=[{0x18, 0x88, 0x400, "94473a"}, {0xe8, 0x10f, 0x2, "a42303e817c1e3a8fa0befc05feb9836081eceec3ab70dc07b465fcc83ea09d0737c8f2d09c194f05ef1e7f16ed1c383accb4ca3c532a4a4ae1148b68b898a5fbe8e1b719a500e53a0bf5902f5e90d7a4dd127a35729f9c36b160805ca09d135debc6ce78022faa1abb04c7a998675fb9293b0693d7be9d916aa54254db283d3ae0acb80371e0da6056ff16ac4b234290d632fc850aa10404106d945aed05bd999098c38b8fa7d3225b70fe14d16391d2dad215da48943ecc6fabd760a200c256c079dccd676c2c8bed238b91329ae3fd74795fc48ccab"}, {0x48, 0x10e, 0x101, "f63d27e3f7f7d35c24cb5b4b6ab9f713c879f23892617a2ee690de01f9cd8e7804ff0f96fb244f18e9d9b0cded117b72aba04051d646c458"}, {0xd8, 0x10a, 0x4, "93e5740c29bbc398e11c6be9144d3a2b468fc889e29c30355b8b63d0900cf612f59f69aaaea1c4fbbfebb168efab0116d32225946d1d6738ff58c528093378f56e8c0eb3ca3bf0cf2d6da0c428672af16cc946c55c6c8de2ec9441ccaaf5181e677481e43e3dc422097589cfd90d6d89b098ef8cffb25083bbcf3a3cc8d08d1e3bff3ccf53a8cd939c2960787d6d473cc04564520b4ee77e03f9efd285cef7ac04393c1df790f1166a320db880282ab2be4ca92ad529d4a262d24fd270606e12ee477e00"}, {0x110, 0x108, 0x0, "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"}, {0xb0, 0x107, 0x2, "2d872bfe93c7a74023d94de470a8a3c2bafe11651a82cd1c8ffd4931db24d7362096031b976027278a6d874fdaaab1792823eb43efce24f3b301b158835bf9a0e40bb123879b41ade26fc8d745bb734f2b14d14897cdcd8050eba754e069d756c6c6501bd8edbca7afc1748a27fba6ac369414f36d0f8ad651e51650f4ae087e6b2af6fc2942e507160b89fd7d2c5d6f4eaa549dc9e70099dcc969f09b6681"}], 0x3e0}}, {{0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000003f40)="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", 0x1000}, {&(0x7f0000004f40)="d16d5ae03e266b6676baf202658f32814b70bb031e9adcbe9b55afd189ea8dbe9910d10fb0e7ef2ef21464bc5ff71533af3b6f85cd3816da3f2f109f391b33d3df62cdfad376870f3f769cd3ae51707b36b7e388aad51709a405bcbb649f061eab6ab7d1c6fa116998a92ddcd6dc930e8b7f6707a1bf45520fc45f04dfd978a82c3f", 0x82}, {&(0x7f0000005000)="09ceb8a350338a8ad99b704b2994217281619ac5db443e2e7c5bb8b88a5a1e110620fbe692a3436b075afb57619e7fd87597d6e6fd868e5530e3e125d3d93d8a2f5588dcc709", 0x46}, {&(0x7f0000005080)="329f878877c1127bdfcf366df0a601d7cdec3a9eb283d2c2cd4cea316d6824fef6630ab4b134c4399beb32e75bd47d36688e0fca6ec1f5cbaa25529d1509c78e7d1b2dd39ffeb4a1", 0x48}, {&(0x7f0000005100)="416bd64ee1723642c25788ccb638e0e78a6a58e2742ca525571c8a56e25ce5c54adab782edd0c2d1aaf8c18ba1a490cd6df7fb7f6d42815f4f37bdf17ec03c79d80dbaa7e0e037f3c413c1b1ffa9cf33994100cfd0fca82f2c45644bb361141736a1e45d4c7bdb419e47dff64d95fb7e3c7277355bf633cfaeab8a76e9bc16ef1657e791f2a0a47549d44b408568b2afedaae9c2f4aa05eb1c2603ce2d7a85b765a96b4a852aac2c2ec6a8e48ea5", 0xae}], 0x5}}, {{&(0x7f0000005240)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000005500)=[{&(0x7f00000052c0)="31e0efe97d5058b61205de206ef261c50c67a28c33164e421359d4440af3708430be2ca3158239a211c324d0c299398c7303e3b510d4cb8d575dcdbcbe020af77cf50b1e96a5e3eb2925a6", 0x4b}, {&(0x7f0000005340)}, {&(0x7f0000005380)="9b9f1ec71555c934b4578237a226c26bcc0284a6b15d7d9a906a4da24ae34b6dfb3cb30a9432280f670c297722357cb64d2df7b8ebdff013eeba2f76e45ce536f66cda734ad9622ca8aec7315c8ebd4425", 0x51}, {&(0x7f0000005400)="ea5c8e95b9003bf54b3be154287cf201dc737f2a16b02315170c28d42a8fdcab93682ed6959ca87e01fdf9fc8c8be90538016dd65b59d27e20578e0db86ba90f89c8125570a3eeecfde096132fe5418047dd94b52b9435686729e1b578d5db759184f7ca2344dfa2f8e27bee8114797456ecc8023b99ff92ef53fb8ae8ace1bbaf7207fa9db3f35611146b6ac3626f0f1cdd35fa7262a4a837300f737189720a40b7adb32a360a47ee5792d344fe9cbdded88272b19c68846ffcf8a3bf8b451f9ee34203d267da54f970", 0xca}], 0x4, &(0x7f0000005540)=[{0xf0, 0x116, 0x80000001, "e6ce7d5456103140fcc138d9d6cd1e43cd5bcf536336be4769fa1ee68db9e417f9b2937762432954bc10a5eeff3693e8946ea4cf8f3b4d3e1702b4edd58b92d7a721a69f033374efac3551d50f71afb6bb9df541218b5b19d5ea8e26cd5a99fdc13a72d49a4691e61939619a6e1b847dca27c2a6f96c79df85704182b6073aa05ff4ae4ad0ca9fccc3b9d65373732bb5fd245ff2ea4d10d188b7c679cfce568cb5f96a04d8fb0b67f6903e4b10e540185806aa789395a3b05a77f217c4b7c2838c9a23d06dcdba95468a6128390a8837dde4854b07427e59de9b01ea"}], 0xf0}}, {{&(0x7f0000005640)=@un=@file={0x578882e0e28b6f2, './file0\x00'}, 0x80, &(0x7f0000005800)=[{&(0x7f00000056c0)="5ae5350960454cbf5c6ee0", 0xb}, {&(0x7f0000005700)="1772cec47ea031d9404feee247b884ab1f03384b685ad2610a66e4fdce531e059595d0293a4950da72f9dca2339320c55881d70d844b4d339529587f1df1c5fc7037d8baaa003ba75336ecabbcb2921f3a78d67523151ce3520dc8a718bb9d5dfe8794e43372ea2238da763a09e8d84956443ef6e3f831dfaf0e906b4945e10f62a077133b0f4ca512c457d56e1b2a42beab537582b31d2a3cd2a6124cedcf8677888b38ded14fefce96e079ff5e4c63214ecf5385b285f6edde340dd4cdeb971e8f0598a765be1622a21e6bc3b0e79606b0b4a21aa0c908", 0xd8}], 0x2, &(0x7f0000005840)=[{0x70, 0x118, 0x81, "5a267dd30250a8be45ca291e0085280a883ca2d1d9de9727215064faaee0c0f10c27086ece75db944fcb6e84e230e8649348506ccb17412be74fc83b695bdccb5bd314a79caa817e550fdc8328bc0e8e4f762fd8b424a645bd2dddf1d3"}, {0x40, 0x10e, 0xd6, "d6c531482c579d7412fcdb936b4301d3be4d54bc44a06a72f3844dc4685095732b1dca614002c54d59f722e035"}], 0xb0}}, {{&(0x7f0000005900)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x1, 0x0, 0x2}}, 0x80, &(0x7f0000005e80)=[{&(0x7f0000005980)="2aafb6638e851abebb4b918ef886203c7fc44d4636685ab2a30dd0bf690cb8829b81a3dc05329d9e41511497c9ea9ad2b1b9d851ff4f296989576fd7788448a8374e5bba17218e1420b5d4f9ef2de3834809c8691ce33706907d52b48b3884a2cab9c84668f358068df2107d53b9d26002e5b355796a64f1d8ff", 0x7a}, {&(0x7f0000005a00)="27d29d526e8537ac6b057b2de7bdb12fd1bcca63456da0acf717c888c226dd676d5898d623a8325df9dba0a48aafe95e30ddc400de224cf0ee21d7f799bd16160174d9d8811b1886562b08fc4705aa91dd37473599557356ed28e8d948df84f6aa05bc7b58803e41eba4181eb0330cbd873112ce0bbf216a424378a4c5a710b30ca52e2658da0fe4fac2668c0b73b9bff64c4bf065b99f3cd7db5efdb22e89bfd7362ecdea0e922845cafa2ab648e00c0f1e7cd971efbf0647f049f1b7d3c8b5f3266d79c405c62086c6b1f5c13541266753de89b14dba077a43dce4743b867e", 0xe0}, {&(0x7f0000005b00)="b755de9554b401c60c2824b873a15b26c0357c792efefa09bb300cb0465ccbbf759b0eaf0b70c705648b17abab3b4d4f7155be2df6f1362e992d6ce5bcb80e5e9c3c2304c7cd477cc236a3e6cf74946006a59884c7adc5492487ba974ef1792d30ccf66478d73ee91361f499e272d58980752b9d97db66088b24031338e053671feabefcb8131a05d9ad4e0790cf23bb84b71aa1026fc2694967dd8aa931992eed627602233e0190cc610a477b25002a7bebc12ba45826e030ed4b767e0d50446d", 0xc1}, {&(0x7f0000005c00)="6ea2da15ba365ba5f952fa10911a66fdc6098bc183353828bee8f07e7f484912c7061640cdec4efc1bd551d82fcd0ba389ff7eecf03c96085497e17e8d3f14dc3f2139ff287502330d9f229986049c14feaf67a4d3dde88ec42b24f6a8641281abcc9d3b5ad0c7d59be12f7c794eec0efe35d9515cd362902ff3e3859dcd0fd64f840656e46e275b12a03b566765a640e7fed4d8f915eb2e1f54165e1acfeb00781fb3533b35040e5020527c12e32270cedcc817e92cafd5c0b40f28f705acd8099c5693ef49d633e5f5abb6ac8c8a6af3d0dba3c7008bb674e867f9de2dea789b", 0xe1}, {&(0x7f0000005d00)="f3f8503bbb87f59a0d0fae66f14415f92a8a772049effed8ab97044781cf6022273598dd53b65585dec344f1ce968ab45e9aba514fff0f76681259a7e86a22a971b642f5aff0fabf893f6ab3550a7eba0674fd0108c104773109dcf09e4b650bf763f556ffa1", 0x66}, {&(0x7f0000005d80)="46de50b41b8036b157ffc20b44cdef849597c459c8a9915b1bbdf49de3a8fe67982318c99c158ef32d987cc9c24ea8407f140d94c4e6cf12921488f783d16d36eb8816519361eacb1ff4a6412d61f3ac45fbfbf5e9c5e1011ecd5fd07a7bd794964819ff73286f8348e64b6a1cdfc81721922ee096e22da201d75b100e04807db633a3ca3fcaf0c15b2f92ebf35347f3d09152383b4c9ed96ae65a2a08496e9e77b2b125602834eead909f2d35b426670373263d302e295a1e235a921f797f4dd7359b23e7d7ec462a49d1bda61e74709cbffd04e99c6462ada14b2173ba942e83b45c", 0xe3}], 0x6, &(0x7f0000005f00)=[{0x88, 0x10c, 0x56245081, "2708eb8062f2348048c42c96f943d974644fe651a37e284df38f303a6c0dfcf91506545f0aea925dcee48a2cc793437bdd8e622847b0abeb1edfdce37b4129b3521b9a7d754c229d0c13b1d60ba99b6920d8015fac4bc8c7378a928960ce53024563c7e8f8485af9aa5c8e99bee9ac928af471233ca618f4"}], 0x88}}, {{&(0x7f0000005fc0)=@pptp={0x18, 0x2, {0x1, @broadcast}}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006040)="9063bae73f000491064ef494a24e8c8c8328d095af5ee9b74232264abbac991078500c1346b4c59906af4167633e8a", 0x2f}, {&(0x7f0000006080)="d9b36469f2bbe1bf7fb1c7098a744203064817550af4e40ea2477085faaf3e377a7bc7351d5d2ec6685dca00fb07b3cde08c6464ee631634896d99c218fc4f3a2711c765618bfc721de32cf7cf6733d20750c5d59332066826e19718663ab550a9e653cc92202c2ab9d5c414e770f7e37d438ed4275f4cf9257cbd7163927bc8f18efbe20989f36cd74deb67b16301f59d9ae358794332755693cb87523dc0e9721fa93a00009a0b03aae4a68b9b7ce2b7c144e060905e4613534b7d8f0cb3c253eee9b47cde4a7532f3d8bc60bee290", 0xd0}, {&(0x7f0000006180)="b0d8c8e7437b41dad82a10c4554a89f9d1158d88892061ca8ed6a2dd1689ba61ce538ff86f9419f601a794056116ee1564822469802a18fbfa87a3789ef94837ac4f3e26fe9f47c8e99cb954d8e534ea182c6505f31323c427b89d797d016b3c2264af48221ab0509b914d3fee1a7f66ce4b488d1e7df70b1175ca21b0625bff75f600b83127434b306bf6a5630030abe4f9edc425e1a52e6f4d025e9d28952d7d15", 0xa2}, {&(0x7f0000006240)="482e4661d4e575e080e2a63c767280c0b3baaa4125bfa9269b5d9f4b23f5b03c8bbf6feca93f555890e8b5f415f16a3b60d6f6bebbd38684150919ec137465eaf1544d63ced88f0b13f12d51dd5aa5659a725d3610eddb984c80b67cf8f7bbd9d75b3b89674bddc26ddfa7e3da8b1a03def9b727fbc81dd7062194a36c7fae608b7f0e15569eda68a8131b2f2255d45c377d113e5ba03e62efafacff1114af5ef14d54a1137b89154d7c8882cbd06bbf97f85dcc182c1d0ebf2434efa932b4f987b57151b43bc64a13b0ca25d9a7e26f6cd55c", 0xd3}, {&(0x7f0000006340)="9e4c0160332b6851f7cf", 0xa}, {&(0x7f0000006380)="9689a19bfb64c7c4f231d7c037e2ee4dd6a4aef9acab1785b5d8ddfc676d522a291e8b39d818efcb4adb442a4730132e416987b2566c", 0x36}, {&(0x7f00000063c0)="9f8ca7092d4d7dc23d75fad03863c201d62067cd20b7b73f54dc115ca955be49261b59901cf7ef5df87123306b69d5ab0d409f1ebfb66935d4c5bb0c4fa2c655b02a53cbe157e3c0c88cb5cc274763bf05eb649327c3c2eced68417b5d503720260c007196a9800a64bbb290f7af5b94a4078ab10b702699b1d2819129edf47bbf819be7af83faa14b0f629251d96328dd5c8ae2", 0x94}], 0x7}}, {{0x0, 0x0, &(0x7f0000006880)=[{&(0x7f0000006500)="8541ef2c604ab314e70171d1", 0xc}, {&(0x7f0000006540)="826798b9f64a7d31bcd45b524447f391514f04747f1db5d216778962d6047eb16cb43b17c5b650d1d222e781dcbe3a023f94449b74133057d55f7eabd7e98ff986dfe0962fb11bddd10f8b3179e3c798083b43551130fa246644f780aec08fa875cdd5d3b392dd2daa2401395ef28d5e265d2b37d8b8028e518e106be72335f940118c543ab736eb413b364b663c5f560e4cc599e7ea0feb13e84c05173e1a49a63ceff6de3cc831eb07858b98098072b25129c79387b4b628ef5396b06b2b42c1d26412454d12904761488c673bddeb40c899109c6f0909f17b0659d4", 0xdd}, {&(0x7f0000006640)="de9483573ed1d665e6365a0cb90b8e26a8af1307555c209935623d8d5371013db97964e8d306ec65b6f2e1b998cc51fab589882d5d62c92b92485469679ae5cd", 0x40}, {&(0x7f0000006680)="20a3a172892f4ef49ba131a5bd145c63e716d7caff30c4703c23f039c3178d10cc1e3fe49c166d57dc78f016ac0745041586d8e4cfd758c5fc822d1f8de21bec0d7bebd7dd93d21a546a5acb2df5772e09fe1be4d5fc310638cfe89428598a24f02a09", 0x63}, {&(0x7f0000006700)="347d5d428bd12fa6ec28120a12953353ae8d617485c7982f263b91e4c22f3a3244fb7b4780c5cda01320368b7ec86f3b1854024ed57f7a43eab4ecc869a71c8348a60bd504483c9f6a28225c6c686c21645937e960ad011bac316ebca9afa828b0326f8ea8ba2d4d2e374aaceffc2930c78e3ecd829744f2cff776c75b48852d5d25ff7941da42b816ca9c09f913edd74d9c61c3fd87048bac39e3c2016a53dd9db87a03196d665f23e7579c63230e71ded1ef3cec4008506535c710f33354e1828f7af283", 0xc5}, {&(0x7f0000006800)="587d3d2d69f2f98418de286555cd9814a0fffa5f030aa1a433ab094476bf71dde7906c2b30beee541d35f059e90c37e2308ef3bf4eecb7f7e4b2e3f609ead4bd9d2698045b60662144", 0x49}], 0x6}}, {{&(0x7f0000006900)=@vsock={0x28, 0x0, 0x2710}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006980)="43dedf07453c1ed0d4737b4dc2dee7957f2ac4aa3cd6293b9a75e6d3c869ab73943d52b3f5db34a5d76e228da5cbf7f9aa94b48d2f0bfe894e2bbe62da9357a9a758afc07349b6bb4de1451959cb94c39075b64aada9f260693c2416867520e730b65326484d", 0x66}, {&(0x7f0000006a00)="1c968afe7c11707480f4d66ba5839b141c2910ea1b8a5b4f1fd9049da0e8c8cc24bdd553cb0a5bcfe3f68c6f745a4bfbe37a262972c80944cceb8bfacb12e8b7636d8a24318d69b61e0fe3ebf3c1a0bfae41504319cfa9eb65d176f4b65083219ccd5c5d282f9ce9f89c13a42a43b96c4008330d9ebaed3c49b8d621fea720934518a4ca8a4e1c7b6820d5d330cd0261cd6a45d7e9f7", 0x96}, {&(0x7f0000006ac0)="2158455d7e8c9d129b0930a8f4c7bf09db623464c901ebc081f73999bc7a68997e2f0408041fb3c87fe5eeac3ea8a49a75229c8a048e30fb5f4d96368dbd2d27f1f619003aa475763ec87470c6ab5834b924463be1e6e1897229dc8806c7078cf1fdcb737692738972af944fe55c0085b9a1fcc7c837344a09", 0x79}], 0x3}}], 0x9, 0x4844) r10 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x100000) ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006dc0)=0x0) ptrace$poke(0x4, r11, &(0x7f0000006e00), 0x7) prlimit64(r11, 0x8, &(0x7f0000006e40)={0x4, 0x3}, &(0x7f0000006e80)) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006ec0)='rdma.current\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r12, 0x4c01) [ 2894.715892] device lo entered promiscuous mode [ 2894.838713] audit: type=1400 audit(2000000536.440:12291): avc: denied { write } for pid=28515 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r5, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r8, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r13}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r13, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r15, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet_mreqn(r16, 0x0, 0x4, &(0x7f00007e6000)={@loopback, @remote, r17}, 0xc) r18 = socket$nl_route(0x10, 0x3, 0x0) dup3(r18, r2, 0x0) dup3(r0, r1, 0x0) 03:42:16 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:16 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:16 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2895.279059] audit: type=1400 audit(2000000536.880:12292): avc: denied { read } for pid=28515 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2895.304468] audit: type=1400 audit(2000000536.880:12293): avc: denied { create } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2895.310114] audit: type=1400 audit(2000000536.910:12294): avc: denied { write } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:17 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) connect(r2, &(0x7f00000000c0)=@l2={0x1f, 0x58, {0x80, 0x0, 0x8, 0xff, 0x7f, 0x5}, 0x6, 0x5}, 0x80) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r9, 0x0) setrlimit(0x6, &(0x7f0000000280)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r10, r11, 0x0, 0x320f) [ 2895.385127] audit: type=1400 audit(2000000536.970:12295): avc: denied { create } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:17 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r1, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2895.386586] audit: type=1400 audit(2000000536.990:12296): avc: denied { write } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:17 executing program 0: prlimit64(0x0, 0x6675a80588eea4ca, &(0x7f0000000280)={0x5, 0x8d}, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x92d000) io_setup(0x46, &(0x7f0000000400)) sched_setattr(0x0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') mount$fuseblk(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0xffff0001}, {0x3f}]}, 0x14, 0x5) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ftruncate(r4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0xffffffffffffff89) [ 2895.513913] audit: type=1400 audit(2000000537.110:12297): avc: denied { read } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2895.544531] device lo left promiscuous mode [ 2895.632286] audit: type=1400 audit(2000000537.230:12298): avc: denied { read } for pid=28536 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2895.725526] device lo entered promiscuous mode [ 2896.130707] device lo left promiscuous mode 03:42:18 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) sysinfo(&(0x7f00000003c0)=""/134) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000000000063ffffffffffffff04000000050000000200000000000000000200000000000000000100000000000000010000000000000000000000000000000000000000008c2d00000000bb7acbb900000000000009000000000000000100000000000000ff0300000000000000000000000000000000000000000000002000"/144]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r3, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0x9, 0x18}, 0xc) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x7, 0x0, 0x3, 0x8, 0x0, 0x9, 0x10004, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x6, 0xbe}, 0x2000, 0x100000000, 0x1000, 0x6, 0x200, 0x1, 0x7ff}, 0x0, 0x3, r3, 0x3) close(r0) 03:42:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000780)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x80000001, 0x8, 0x7, 0x1ff, 0x0, 0x6, 0x0, 0x518, 0x4, 0x0, 0x0, 0x9, 0x5, 0x945, 0x1f, 0x8101, 0x0, 0xd01, 0x0, 0x0, 0x1d6f, 0x0, 0x200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], [0x2, 0x0, 0xd6e3, 0xd0, 0x3, 0x101, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x3, 0x5, 0x6, 0x0, 0x0, 0x0, 0x7c8, 0x2021e7d2, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0x4, 0x7, 0x0, 0xde54, 0x0, 0x0, 0x1, 0x1f, 0x1ff, 0x3, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x8, 0x0, 0x0, 0x1, 0x2, 0x0, 0x12]}, 0x45c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) io_submit(r2, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 03:42:18 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:18 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:18 executing program 1: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000040)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:42:18 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:19 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r2, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:19 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:19 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1700001000050700000000000000000000e7002d47240aeaa849159dd94e02eb3814229a330169bcd515922a910480efdd4d4fc791444c1525be88ad20b6ae8bca73c762de3c60254c5f10c0", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 03:42:19 executing program 0: prlimit64(0x0, 0x6675a80588eea4ca, &(0x7f0000000280)={0x5, 0x8d}, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x92d000) io_setup(0x46, &(0x7f0000000400)) sched_setattr(0x0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') mount$fuseblk(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0xffff0001}, {0x3f}]}, 0x14, 0x5) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ftruncate(r4, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0xffffffffffffff89) 03:42:19 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:19 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) select(0x40, &(0x7f0000000000)={0x20, 0x2, 0x4, 0x4, 0xf4, 0x0, 0x8, 0xffffffffffffff00}, &(0x7f0000000040)={0xfffffffffffff3dd, 0x80, 0x100000000, 0x2, 0x1, 0x9, 0x94, 0x5}, &(0x7f00000001c0)={0x2, 0x101, 0x3, 0x6, 0x2, 0x7e8, 0x4, 0x3}, &(0x7f0000000340)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x260000, 0x0) dup2(r4, r4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r4, r6) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)=ANY=[@ANYBLOB="170010006dbee2137a2164d050a571118f1f17043795cbd530cef17bee81286db4c2b378a9f4742d9b35d306e306e606d01dfc214bbae1a14e12746ebe48daa94f5e25ee9d66b890301c51d2119ff6e9a51296879d8f6b3c869ace8bbb65ce9bdf6f46ec7589e3aa7a76ae4679d650f228f2064066406db11b4163c83298c5d5604c183200bca198adc01db9c9f0e5f7790dd5cbbdff168f8b2fbb26bc5e775ecbbf5ed78a942f796de61f7d16ef9c877a52", @ANYBLOB="00000000000000001800120008000100707070000ccc459ef043f62aa03cfa1e01951ef5b395c761a1957b6dbaa0d54f19d9fd5f80ee494e62ba13da75dfd33ff5e33b4ac463fa3775632ac008da4f733c14f0fa4005c934f14d597f8eeddc368b4f4e6370d1cea81e833aa8fa94ac7d3f366995f8f0617cf2bd988c9ab4af2b9261bff8a122eeac75600f47ffe9728def7ba94eb3fda249527eb618386886740aac4abbd62247745854bae82de91f16e9d3b20f513fc012e667d9a439ecdf975caa7d21f46f9c5ccadeea4693348c5acb86c9af98261b1038727021541c441c22086953ad20d586c2caec", @ANYRES32=r7], 0x3}}, 0x0) r8 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r8, 0x0, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x804) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x1126a922bcf03925, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r8, 0x400, 0x870bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10008000}, 0x9dca1d1fbe803941) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r8, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc021}, 0x40800) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0xffff55f9, @mcast1={0xff, 0x7}, 0xfffffffc}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000380)={'irlan0\x00', 0x400}) 03:42:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) clone(0x20000000, &(0x7f0000000100)="0a271dc6e56be22b2c68c23ab0b6fb9c2f6fa8037a0216c4d5128797780a4dbf5cbe3267adb5f5e0cb3c94f4ef7bc986eaec6001d9a871cb7212c1f801e80594fd4e4866aa8d179e73ccbb2264803750d465d68d7104d27c0bde82c75b8a120416aff688c9e3519732e0145d84466d3d2573ba2ee5aedeb16c4eb8671052a461565d3151aa0f6b0804747992d6309a401f309712ecbb6290daf60fbf8c0bef17c94c3c16d47cc4177d9dab9f7d689a9c8e79bd5d771ceb5dd3f1ccbf1e6a8da5d3bfeba9e2194d156b4224c331fd4517fefffbedd40d1032d26fc16807", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000300)="c251d4af193d9708718cf3ed1b125a0f771d30609ddf99e2fabd66b7496d768a993098abd7e9a9124b8b3bd994a494cb2205acf12176bdc16d5ce35c7ea815b1d0a16e7f18346e874fa8a991fe73146a64163dc9fd8c7b1c3e09184906722dcbec76579c8ddd9da1091e98703c4811deabac292bce9fb1ef8dda00f3bd7140c9303b24887fe756177868eda7885a938627edca0befe505a1d2877cb0f72d5335c5a53f770ad9d6886d389abc") mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x2b, 0x3, 0x0, {0x0, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) 03:42:20 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ppoll(&(0x7f0000000440)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x4c, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="116348400000000000451300"/76], 0x0, 0x0, 0x0}) 03:42:20 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:20 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:20 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) 03:42:20 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2899.052932] audit_printk_skb: 51 callbacks suppressed [ 2899.052946] audit: type=1400 audit(2000000540.650:12316): avc: denied { set_context_mgr } for pid=28651 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:42:20 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:20 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<', r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2899.398854] audit: type=1400 audit(2000000541.000:12317): avc: denied { call } for pid=28651 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:42:21 executing program 0: r0 = socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x8003f1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000007c0)=ANY=[@ANYBLOB="000000003c1b00000000ffffffff0000000000000000ffffffffffffffff0000"]) r2 = pidfd_open(0xffffffffffffffff, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000a, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r3, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) fcntl$dupfd(r3, 0x0, r3) fcntl$setstatus(r3, 0x4, 0x80000000002400) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb314d", 0x29) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000002c0)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_SCRNMAP(r6, 0x4b41, &(0x7f0000000580)="dd2ebce2d02f4701477b9e9c66d9c40e28446fc68aa350843892161776d3f8098e839f87dd3aca753d2d6122b66ddd1fcd7c590d238a39fd9cd52dcba22d7b82084996938130d08a3ca974330a4b83879de4f31cf89c2122eed454920fb76ead3ec574e4d4e52b3c6eb224c3edfeffffffffffffffbb0bcfdcee10a6a52898ece32300b0cf614d2895680000000000006b7bf548e78f578155c32589ecacaf44006e1128b7c080fbec7d50a5d7415e1302856768acfef243796a865a5a788e00d5611660c278cec5ebc2418acf16ee9462f4e03a6dd4e50fa12daa7b737c8988b427f4cf507766b9d00d27b19f1cbf48bda39a") epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2899.784070] binder: release 28651:28666 transaction 18 out, still active [ 2899.793967] binder: BINDER_SET_CONTEXT_MGR already set [ 2899.800040] binder: 28651:28666 ioctl 40046207 0 returned -16 [ 2899.818104] binder: undelivered TRANSACTION_COMPLETE 03:42:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet(0x10, 0x2000000000000003, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$UHID_CREATE(r3, &(0x7f00000003c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/234, 0xea, 0x0, 0x10000, 0x7ff, 0x0, 0x7}, 0x120) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002600)=[{{&(0x7f00000000c0)=@l2={0x1f, 0x3, {0x7f, 0x9, 0x0, 0xff}, 0xa3ea, 0x5}, 0x80, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000200)}], 0x2, &(0x7f0000002740)=ANY=[@ANYBLOB="d0000000000000009d03000005000000a964f40a8ce24b048fba9a2f0468dddb6351495e4a7f3031a7b8f7356c578f36dad59fce909bc9236d1bd02ea7870de18795a28b759053c32be9c45800f73740d95b16725806aeb0f9aebbfb03e415fb3a8cc492a841289c525966da7f6a42fa48ff61f8ea381b9de2429732e01705fb30af4e54a76deaa7753f345a26cdfd4a5705dd91c5bff99ddb0bc351f172f0316aca0ed63b6c8180f3b6464405169c465937daccac9f7c68b6ef63eca45e8410184912635af8bec41b1300000000000010010000000000001901000008000000b9648a344eead35ff98cbbb1e7bd6fa752cdb5c7004b74cd9f425650407ea4a7ba3d95aa8d302115c9020000001c66aff60b3d45ac2976b493adf27017238c254ac6b6544db242f7849abe099aaa8f14004dedae69c8b72387b620568cd85292bf6db372ad0b83519272f809c4fa818b1920854055039fb0080773a9a25541599244b09ad2313cdbee509741e89bc66edc770c326e060a60bd2d5ca70f970de65f658c13f1bd9800905ceb406afe87486c12626e67463cac6bda715a6be8d628706bff7697b4a9d844b2e9e68ba5f3179d4652ee3e81295f19fcc44b95bdea5dcdbddcd09137e31d5f0bbfb1d23d49a748c31321284711d7b477322511ad2000500400080000000005010000d8c10000ab7731b66f5b08be0c37967d6152174096861af6e830631c583c6658b4695c3bd8898faea798207bf6b949d3aab0438c7d4a318ce346b7ea9f2d0d459be218ef2700664714de7e2afd606d9dfd452f257235a5fb9376d1ab25d7f4e68c3e97272d59f01e9b71be490246f5e10b294c854dbcbbfb6a2d1271734f9e54c52e58223c1f349e941a4dcf0727a473a609eb8e3660dde3d0cabd904c43831b63064f131180470eab5ceaf1f0e254a06868903d872f7b56cbe77845ed88087525d94849e564efb95d0f3bb39d7b90cbb535ffabfd6ac260e6be31b6bbc52f7fd31aa275b9c0"], 0x2d2}}, {{&(0x7f0000000300)=@caif=@util={0x25, "1af407f366ee96aaa4d4bc2b32da5026"}, 0x80, &(0x7f00000009c0)=[{0x0}, {0x0}, {&(0x7f0000000780)}, {&(0x7f0000002700)}, {0x0}, {&(0x7f0000000900)="449e4bb93ce17725ccb9287bccac3a7e6348fa5bfd80fc4d3ba6cdd3590ba31e5a36b279f7f3eaef3b5a6552e7ccc42a852b876a698769755f2a95a3aa4a7d9e3a1e24f53b5ee44e45408928e85d5a", 0x4f}], 0x6, &(0x7f0000000a40)=[{0x70, 0x10b, 0xffffffff, "e97c03f1bffdd114fbe1dd998682072beb274f48e7c494695c0febe1bcc69aede120fb6c08cec5424753b0fbfbb7aa24c015e845e1c4b87bcdb55983423c59b424aeb0df0fed9923a6456a03beb06927fb91ab9498a9acf99ef3232b10"}, {0x10, 0x11}, {0xc0, 0x5, 0x0, "d42cd9478b3adfdab541b942eadb4dc8e1876f9778a0df2ad6b1742c2fd4e6ba6a80caf72b6e87cb89330c097eef84cf28471bcab10b1817c2ccca68ea47544928a6d3d042cded25c2fd8396e6141c97a7d40533d3f674b387bd1412a79c097a6f4e1905d2d5e46756702bb07730451ffb9a50446a15d0f6396ebf04451b0e5659d93631b557b3ab8812270827da5498e8dea7ec4dea7e527ebfe254e68145d315193b03851ef77148e5e135"}, {0x10, 0x10b, 0xa4d6}], 0x150}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB]}}], 0x3, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00005befdc)={0x0, 0x1, 0x3, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x7fffffff}) r5 = syz_open_pts(r4, 0x1) write(r5, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r5, r4, 0x0) [ 2899.915260] binder: send failed reply for transaction 18, target dead 03:42:21 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:21 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x3, 0x0, @loopback, 0x20}, 0x1c) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$EVIOCGUNIQ(r5, 0x80404508, &(0x7f00000000c0)=""/128) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RGETLOCK(r6, &(0x7f0000000300)={0x2b, 0x37, 0x1, {0x0, 0xfffffffffffffff7, 0x3, 0xffffffffffffffff, 0xd, '/dev/net/tun\x00'}}, 0x2b) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)=0x4d4) r7 = socket$unix(0x1, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ve\x10\xc6\x00', 0x1}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="2800000010005fba001000030000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000f89093ea170b197374b5912ed55f28cb8f9407147b62ec7359abe47b79c70adca3a3479ed87f51e2ea1fabb0b1b13f95fbc4abdbf343a39ae8aff21f9f0ca800f4da99358c5bbee8f61a8d83fce719c0b83e"], 0x28}}, 0x0) close(r8) 03:42:22 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:22 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r0 = inotify_init() r1 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2780, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x220b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) vmsplice(r3, &(0x7f0000000580)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000300)="27cd69643bec81de94e69abeccdf6a1edf050db088794c9e825240e60f3b741744319eb68ea70087cf64ce4c26263bfb7bdb859ccb0c91d69dc48c4f5b814216725956b0fe4505c0538c0cb98dfd195210d8fbff1fa0fc1083d88d312058f776c1f640b3a813d5e665de42f02182330b1fdd4116c3a3b21ae741b8cf619d911f54a4e902be22f85b7c98ec2c7615f1d03de0203515fdf0a21816", 0x9a}, {&(0x7f00000003c0)="7580c51a8ffe377a57bb9c5e31d72612a54973e36dd8154aa3fb4a1337fadc7c03885ad7539495cf6e47f89e2b961f19704bde51f28ca9a8cb7df3c641fa1f50b4c91c8cf1e8f59568b40115e11d135029521784442256a35f970e0d3c1eb32e18ac110200ef41fca462eb885e21e2c09f274d698c628a104d7ef604421185a446efed9e9c3696ee5e2e9029ad19f66f6cbde960c26be13a644ffd1c0dc7aa9080b922693e88de4bf0df565ea8a18c0f2a19fd1884ea7d5d1c8cd3714716b6e14b86874d55814cf449c818e372491336c1060b0f8072cae1ddd5455f", 0xdc}, {&(0x7f00000004c0)="4c8b0792c587aa615e18d36707db2f936e995b13976ad9120dde57d5178ee6bff78bc4acfd624cefcc97a134537c22672fa6fcd8615764ca5aa4687d0a0f66897a4c41adf406552131d31bf2f60a062573211296b96f08bc7073cd5446eaa181493aec215df59f6977d97296e55ee867da3602f6d41120f45893b3cbf8fafad1dc874bb29524b5e27dafc129a82d8c677753df6b047ae9c36447e76a621b66a7a68e229f1ee31b5f3c5b8a7ab7906f8dbb1287dca8dbfa1e6f5dba4c", 0xbc}, {&(0x7f00000000c0)="12d736fa58ec0d7558f19ffd46a4d8b47e3c6f326e09ed3e97c4b6935370c4f29a712fc541cb82e92669defa", 0x2c}, {&(0x7f0000000100)="06e3954b6a658d5a0609c640", 0xc}], 0x7, 0x1c) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 03:42:22 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2901.076158] : renamed from ip_vti0 03:42:23 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:23 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x13, r1, 0x80b1e000) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=@flushpolicy={0x1c, 0x1d, 0x1, 0x0, 0x0, "", [@policy_type={0xc, 0x10, {0x1}}]}, 0x1c}}, 0x0) 03:42:23 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r0 = inotify_init() r1 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2780, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x220b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) vmsplice(r3, &(0x7f0000000580)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000300)="27cd69643bec81de94e69abeccdf6a1edf050db088794c9e825240e60f3b741744319eb68ea70087cf64ce4c26263bfb7bdb859ccb0c91d69dc48c4f5b814216725956b0fe4505c0538c0cb98dfd195210d8fbff1fa0fc1083d88d312058f776c1f640b3a813d5e665de42f02182330b1fdd4116c3a3b21ae741b8cf619d911f54a4e902be22f85b7c98ec2c7615f1d03de0203515fdf0a21816", 0x9a}, {&(0x7f00000003c0)="7580c51a8ffe377a57bb9c5e31d72612a54973e36dd8154aa3fb4a1337fadc7c03885ad7539495cf6e47f89e2b961f19704bde51f28ca9a8cb7df3c641fa1f50b4c91c8cf1e8f59568b40115e11d135029521784442256a35f970e0d3c1eb32e18ac110200ef41fca462eb885e21e2c09f274d698c628a104d7ef604421185a446efed9e9c3696ee5e2e9029ad19f66f6cbde960c26be13a644ffd1c0dc7aa9080b922693e88de4bf0df565ea8a18c0f2a19fd1884ea7d5d1c8cd3714716b6e14b86874d55814cf449c818e372491336c1060b0f8072cae1ddd5455f", 0xdc}, {&(0x7f00000004c0)="4c8b0792c587aa615e18d36707db2f936e995b13976ad9120dde57d5178ee6bff78bc4acfd624cefcc97a134537c22672fa6fcd8615764ca5aa4687d0a0f66897a4c41adf406552131d31bf2f60a062573211296b96f08bc7073cd5446eaa181493aec215df59f6977d97296e55ee867da3602f6d41120f45893b3cbf8fafad1dc874bb29524b5e27dafc129a82d8c677753df6b047ae9c36447e76a621b66a7a68e229f1ee31b5f3c5b8a7ab7906f8dbb1287dca8dbfa1e6f5dba4c", 0xbc}, {&(0x7f00000000c0)="12d736fa58ec0d7558f19ffd46a4d8b47e3c6f326e09ed3e97c4b6935370c4f29a712fc541cb82e92669defa", 0x2c}, {&(0x7f0000000100)="06e3954b6a658d5a0609c640", 0xc}], 0x7, 0x1c) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/6, 0x10}], 0x286) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x82a) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 03:42:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) 03:42:24 executing program 2: r0 = socket(0x8, 0x5, 0x3b) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000040)=0x0) ioprio_get$uid(0x3, r4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) wait4(r5, &(0x7f0000000000), 0x0, &(0x7f0000000340)={{}, {0x0, 0x0}}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x260000, 0x0) r8 = dup2(r7, r7) socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r7, r9) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r12, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)=ANY=[@ANYRES16, @ANYBLOB="0000000000000000180012000800010070f070000ccc459ef043f62aa03cfa1e01951ef5b395c761a1957b6dbaa0d54f19d9fd5f80ee494e62ba13da75dfd33ff5e33b4ac463fa3775632ac008da4f733c14f0fa4005c934f14d597f8eeddc368b4f4e6370d1cea81e833aa8fa94ac7d3f366995f8f0617cf2bd988c9ab4af2b9261bff8a122eeac75600f47ffe9728def7ba94eb3fda249527eb618386886740aac4abbd62247745854bae82de91f16e9d3b20f513fc012e667d9a439ecdf975caa7d21f46f9c5ccadeea4693348c5acb86c9af98261b1038727021541c441c22086953ad20d586c2caec", @ANYRES32=r6], 0x3}}, 0x0) r13 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(r10, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r13, 0x0, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x804) r14 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r14, 0x0) keyctl$clear(0x7, r14) request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='-securityvboxnet1\x00', r14) r15 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="5d59bbb5e5946ab33b0d6f7cbf9a4e3fb9faa2060c5df006f99c8f16c274faeee693754a8bbbbc04", 0x28, r14) r16 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r16, 0x0) keyctl$clear(0x7, r16) r17 = request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='-securityvboxnet1\x00', r16) r18 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="97", 0x1, 0xfffffffffffffffb) r19 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000380)="9698dbb56dd68937e5d2369b6932562c029e43409ccf5a90ad2df62fe1bf8994cb96c94632d20745ecae0c794767eff894c9c8b1364d6b6572e027be622949c82c235d02561a23c30a2b42303c03809154b37a1fa4aed60379bbb8b0f2d7976a5497c08ddbaa0091592d02979206791ded742bc74dfa1a057aca0b35c72b202cd1f45e6c9c35dbe9362a659dc3314632f8c7dbcb4ffc7693bc2976a24f3a02138e49ad43efb5762927789ef1", 0xac, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000300)={r17, r18, r19}, &(0x7f0000000440)=""/45, 0x2d, &(0x7f0000000680)={&(0x7f0000000480)={'nhpoly1305-avx2\x00'}}) r20 = request_key(&(0x7f0000000680)='encrypted\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)='ib\x00', r17) keyctl$negate(0xd, r15, 0x8, r20) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x1c, r13, 0x400, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0xfdfe}, 0x1, 0x0, 0x0, 0x10000000}, 0x4000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="6800f100", @ANYRES16=r13, @ANYBLOB="01002dbd7000ffdbdf25010000000000000009410000004c001800010000696200"/98], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x8006) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:24 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:24 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000240)=0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1000000097020046f3e01f4e5b6c65301197f4da580ebab2c0f5829695cfae09da6ea256f55cd02e4642b8f01cbc804e010e1147487265a4"], 0x38) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1e) sched_setattr(r4, &(0x7f00000000c0)={0x30, 0x3, 0x1, 0x4, 0x10000, 0x8000, 0x6}, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="000eedc95336ccdcf4a41540"], 0xc) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fallocate(r6, 0x23, 0x0, 0x800000008020003) lseek(r5, 0x0, 0x3) syz_open_procfs(0x0, 0x0) 03:42:24 executing program 0: clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="006a3ed40800010000f52d8eb4000000"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:42:25 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x3, 0x20) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x2, @rand_addr="5e2b19d12643d17c5c5e6bd218f316ab", 0x801}}, {{0xa, 0x0, 0x6, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:25 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:25 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000020}, 0xffffffffffffff4e, &(0x7f00000001c0)={&(0x7f00000002c0)={0x34, r2, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {' \x00\x80\x00', 0x0}}}]}, 0xa5}}, 0x2002808c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10141, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x47c59cfcc753ccda, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xd8, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r3}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, 0xffffffffffffffff}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r4}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r6}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x10000018}, 0x10000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000b00)=@getlink={0x34, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'vcan0\x00'}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 03:42:25 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8) r3 = openat$cgroup_type(r2, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f00000000c0)="7674cd9846791ba1caf0c9f72d6ac6fb", 0x10) fcntl$setstatus(r3, 0x4, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RSETATTR(r7, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0xffffffffffffffff, 0x40) setsockopt$inet_udp_int(r2, 0x11, 0x71cdb00b27810634, &(0x7f0000000080), 0x4) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)=0xfffffffe) clone(0x84200000, &(0x7f0000000100)="17cb8275bb169a3e609d8bf614c7a0b8db2dd9aaab2b627220cf73aa6da9495b167da16decb9ce7c08beffaee5df10b1a9c163e2b1de9b17e3333432622811124290d811a07b6b3437239fef77fbecc549a49553d9257b9e65abc9787db7113fc7b3e1e75c64f324dd0c457089d6cad8a6fd3d7f53384a93df6cec2b784be690281453c37d9e0c169d564249a269386540ff3abf4cec11b97f5a241ad2aecda5a0edee06b38b88e65bbc8deae92632", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="016f8319258af9e80199818ad1b2") ptrace$pokeuser(0x6, r0, 0x388, 0x2890) ptrace$cont(0x7, r0, 0x0, 0x0) 03:42:25 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2904.096154] audit: type=1400 audit(2000000545.700:12318): avc: denied { create } for pid=28783 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:25 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:25 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000dc0)={0x28, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@typed={0x14, 0x36, @ipv6=@ipv4={[], [], @local}}]}, 0x28}}, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/load\x00', 0x2, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000900)='/dev/uinput\x00', 0x2, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r12 = syz_open_dev$loop(&(0x7f0000000980)='/dev/loop#\x00', 0x627a84c4, 0x200) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r14, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r15 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/attr/keycreate\x00', 0x2, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r16, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r17 = socket$inet_udp(0x2, 0x2, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r18, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r19, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r20, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r21, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r22 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r22, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0}, &(0x7f0000000a40)=0xc) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) r25 = fcntl$dupfd(r24, 0x0, r24) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r25, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000d80)={&(0x7f0000000480)=@abs={0x3, 0x0, 0x4e22}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000500)="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", 0xfc}, {&(0x7f0000000600)="77d2f20eda2662e62ddc39b0bc9d063c1686b9be55e88634614f964d4fa0f8cf2084384d7be72a02b43b2b5f5aa0c55bc753141bba61da96708ec18b", 0x3c}, {&(0x7f0000000640)="a9a95385037b24d903a60d93f12a0cef8b1931190952978e66634b0ff314f7318a7a9c671b677f71218d0a5fbbb12b613157059c7783a128d3f9852b513036fc5695777f380b3df801154660c3ff800551f444d1103040bf085537d6cf25777c8d5a443929039a", 0x67}, {&(0x7f00000006c0)="c41321fff87abee289d971211d722111ce21f471131ccf67cad585fe75c9ceeea797ec3710d4608e7f9c3c1f309808a4d8267dd155892c1a99c2868bf20cf429f6c617dafe511749a5c36ad1159b6644f58fbbdff2d82e8817367abf52f5239306806ff7c6d2ea5fe9dcd85e2d5decd16f371240910445b796aca8b21af44b7594a93472266e6e4e1b6ebc11368ff8faf1df0ca412ae04e62ef80cb79cb59fd21339c918d64d8ceb44f0832def76d2fd00451900e2f2eb", 0xb7}, {&(0x7f0000000780)="d170d9c6b12a9ce8dafdda7c8f6b3382ac21313e3e06d0e0cc374644b307fa39375b551cff0f3cfab707cdf70adcd289dbe563c8739dc8c6fb8f24a433bdae727b320567a67f8bca5cc9ea12b5ea45d526277c166ef63d90878c05623ed820e300648a90f5252219c1e869f4726db5b8062cdc9f17af150a7660dd3c07f8c493ab89afda4325f94955176d379beabefa2c1bfa27169af2cea122de6c5f3f28e04cbe2667717940cdef839e036b1920cebbf3249ff4ab58", 0xb7}], 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32, @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r12, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r3, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r1, @ANYBLOB="34000000000000000100000001000000", @ANYRES32=r18, @ANYRES32, @ANYRES32=r2, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r21, @ANYRES32=r0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r22, @ANYBLOB="0000140000", @ANYRES32=r23, @ANYRES32=r26, @ANYRES32=r27, @ANYBLOB='\x00\x00\x00\x00'], 0xf8, 0x800}, 0x8000) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000340)={0x4a, {{0xa, 0x4e20, 0x7, @mcast1, 0x8}}, {{0xa, 0x4e21, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7fff}}}, 0x108) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2904.207809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28792 comm=syz-executor.1 [ 2904.363020] audit: type=1400 audit(2000000545.960:12319): avc: denied { write } for pid=28783 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2904.616832] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:42:26 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) shutdown(r1, 0x1) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r2) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000021c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendfile(r3, r4, 0x0, 0x300) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r7) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r11) getgroups(0x8, &(0x7f0000000300)=[r2, r6, r7, r8, r9, r10, 0xee00, r11]) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)) splice(r1, 0x0, r0, 0x0, 0x2d000, 0x0) 03:42:26 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2904.830044] audit: type=1400 audit(2000000546.430:12320): avc: denied { read } for pid=28783 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2904.860076] audit: type=1400 audit(2000000546.460:12321): avc: denied { create } for pid=28783 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:26 executing program 3: mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:26 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x10000, 0x20) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x5, @mcast1={0xff, 0x7}, 0x4}}, {{0xa, 0x4e28, 0x0, @remote, 0x178}}}, 0xfffffcbe) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2904.861519] audit: type=1400 audit(2000000546.460:12322): avc: denied { write } for pid=28783 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2904.897083] audit: type=1400 audit(2000000546.500:12323): avc: denied { ioctl } for pid=28783 comm="syz-executor.1" path="socket:[214250]" dev="sockfs" ino=214250 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2904.898743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28810 comm=syz-executor.1 [ 2904.998408] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:42:27 executing program 3: mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:27 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:27 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000001c0), &(0x7f0000000340)=0x4) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x44, 0x2, 0x2}, 0x543f}}, 0x18) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e20, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00^\vUPj\x01\x96\xd0j\xd0\x02\xf5\x03K\xae\x0fT\x8e\xdb\xc6\t\xbf;\xd5|\b:_\xd1}X\xd5\x056\xdb\x80\xd0\xdd\xfd4\x15\xee\xf1P\x9d\xff\xe2', 0xfffffffffffffe98) syncfs(r0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000280)={@loopback, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000480)={@local, 0x0}, &(0x7f00000004c0)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000500)={@local, @local, r4}, 0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="380000001000050700000000000000efffffff000ec53db691a82e04e7cb0c78cc7ca6777416c54228b4d73e7a87d9cca86618ebb81deef44fb7aa3a9643a7719ee25a34991aed1d556c8588618b51e9574cb8373901e15cbbb83e3a", @ANYRES32=r9, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r9], 0x38}}, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r9, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000400)={@rand_addr="96d0a091abe4dce5f8b161f3d22a68b3", @rand_addr="a01f6cc0f64434e64e3cdb857c33ab63", @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x8, 0x8001, 0x100, 0xd34, 0x40a0202, r9}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf869edb0f12e78dc, 0xa, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x1, 0x8, 0xd7d93c89a1eb9878, 0x0, 0x10, 0x4}, @generic={0x9, 0x2, 0x4, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7ff}, @generic={0x1e, 0x5, 0x7}, @ldst={0x3, 0x0, 0x1, 0xa, 0x4, 0x0, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffff4, 0x10}], &(0x7f0000000140)='syzkaller\x00', 0xffff, 0xd8, &(0x7f0000000180)=""/216, 0x41000, 0x1, [], r3, 0x3, r6, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x80, 0x1, 0x0, 0x5}, 0x10}, 0x70) fallocate(r1, 0x0, 0x7, 0x6) 03:42:28 executing program 3: mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:28 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2906.659550] audit: type=1400 audit(2000000548.260:12324): avc: denied { create } for pid=28847 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 03:42:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x20000000000001d3, &(0x7f0000000000)=[{0x28, 0x40, 0x0, 0xfffff038}, {0x80000006, 0x0, 0x0, 0x6}]}, 0x10) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r3 = accept$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000240)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000280)={0x6541659e6cdad0d7, 'eql\x00', 0x2}, 0x18) socket(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r4, &(0x7f0000000000), 0x1c) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) keyctl$describe(0x6, 0x0, 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32=r7, @ANYRESHEX, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRES32=0x0, @ANYRESHEX=r8, @ANYRES16, @ANYRESHEX=r2]], @ANYBLOB="000004000001000008001b0000000200"], 0x3}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = inotify_init() r12 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f00007a8000)) r13 = inotify_add_watch(r11, &(0x7f0000000000)='./control\x00', 0x70) inotify_rm_watch(r11, r13) inotify_rm_watch(r10, r13) keyctl$revoke(0x3, 0x0) [ 2906.793856] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:42:28 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6erspan0\x00'}) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2907.251409] audit: type=1400 audit(2000000548.850:12325): avc: denied { create } for pid=28847 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 03:42:28 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:28 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2907.345604] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 03:42:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/netfilter\x00') setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0x6, @broadcast}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(r2, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000480)=0x80) sendmsg$IPVS_CMD_NEW_DEST(r3, 0x0, 0x40000081) r4 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r4, 0x107, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0xfffffffffffffecb, @local}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x4, 0x9b, 0x1, 0x4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000380)=@rc={0x1f, {0x1, 0x0, 0x0, 0x3f, 0x8, 0x43}, 0x1}, 0x80) getdents(0xffffffffffffffff, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0xb7d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r10 = open(&(0x7f0000000200)='./file0\x00', 0x501800, 0x0) r11 = gettid() fcntl$setownex(r10, 0xf, &(0x7f0000000280)={0x0, r11}) syz_open_procfs(r11, &(0x7f00000002c0)='fdinfo\x00') r12 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r13 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r14 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) dup2(r16, r14) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r17 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_ADD(r16, 0x4c80, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r13) ioctl$LOOP_CTL_ADD(r12, 0x4c80, r13) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r18, 0x4c80, 0x0) r19 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r20 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r21 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r20, 0x4c81, r21) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r21) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r21) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r21) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r22, &(0x7f0000000000), 0x10000000d) ioctl$UI_SET_FFBIT(r22, 0x4004556b, 0x3b) r23 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r23, &(0x7f0000000000), 0x10000000d) ioctl$UI_SET_FFBIT(r19, 0x4004556b, 0xd) ioctl$LOOP_CTL_REMOVE(r23, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0xc2, 0x7, 0xf17c, 0xc, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) 03:42:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet(r1, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, 0x0, 0x57fc) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shutdown(r1, 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$inet(r5, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 03:42:29 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:29 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:29 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = dup2(0xffffffffffffffff, r0) write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x20, 0x2, 0x5}}, 0x14) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:30 executing program 1: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000000c0)="eeca4028e1c91293551507be678ed2e29f9035aa15eba713eb19df2e87344bd0583d598aee003320d7481a464c74c92472306863ec03e77caad0223def1647004ca77fc911ef12a1722ccf51d59ccc54dceb6781050e11859237067b001b226b24fef448c84753dacafe8cfadbc8ebd37d5eec0c7c3a338c4786d289d3f4b2c9eb70ade2863188c60c55fa277ad6239faaa7ecae3be6a3", 0x97) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000001c0)={{0x26c80a56019b3f38, @local, 0x4e21, 0x0, 'lblc\x00', 0x8, 0x2, 0x15}, {@multicast2, 0x4e24, 0x2, 0x1, 0x5, 0x8}}, 0x44) 03:42:30 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg$sock(r1, &(0x7f00000026c0)=[{{&(0x7f0000000000)=@xdp={0x2c, 0x4, 0x0, 0x2d}, 0x80, &(0x7f0000002600)=[{&(0x7f0000000340)="d3465cce6681760baa053cc5f035907203fca71f52b87da80bc96ee46aac7699a142357a33ea3d6aca86b2ed44d4e960e4c8f1cff1bcf451007cbcbb269d1297fa970e7a212d15469174781b2f768e2e0a9ecf62d28a5da17571fea21ab370cac18c716c3ec750c298c49d7bada74ce90fe1ddc3b91f87baaafdf5bc0fe39082c5a3ced0fcd2f8ccd33f1502b36577abf088df345902549d67e45835d0d9adec8f172d854644ea14fde50d1b8fe24cc8f7822bccfb82d5d27a497b7fce18bbc1c800c71982f7f25a216fe9b356c0ce", 0xcf}, {&(0x7f0000002700)="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", 0x100f}, {&(0x7f0000001440)="4aa225ddc0e5b71cde3f60d8285330a673864a44f6dbe806fc04726385e709165ce7172aaa65be5d3f2aae8c44906d084f15384f00bb434b853785e06edb67d08c940f2c43ac4dbe52a8ea55345ef4824b411c29631ab3fba4205529b4da9c78da3e56f363ffb4f889e19743de874a39f608750d812b9ca083ca82ae6c4e7cf61968c405dadb92fb1833fb46d98f1b71f8ee05c3b7b1e0e4d67cf1dc1175296a3a187cbf930e", 0xa6}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="d49f8b7e34f5ad4210f8526b30a0184860257a0edb5cef50f49b448c6afbe259f0569198259fd8b49f4f7ce3bfa267340943561a660adfa8342e1c5360ed2bdd762957a0083e9873db1972f22df78df1ce62b88f24bd6024d3db12b074ed0f9ac0f15480c0101a8f4aa584de15162a127a7b5d8d921a84e6f1ce40208b14b61c63ec1505c60d95db00fbebb4ace9e725a04654038e86839e9d7a1a2bc9a2f198947baa5d68c3420e6aee6f4a5d55dc5f4425a987d86b68b017283e54d103bcc306b815fa2d9dad8afbfec50fbac74dec1fe9", 0xd2}, {&(0x7f00000001c0)="6cd31fa35ec8cfc4c192d79db24c724747e4211a3bcd0c2969fdb3070159a3", 0x1f}], 0x6, &(0x7f0000002680)}}], 0x1, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = gettid() r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x692200, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1e) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x1e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r7) r8 = socket$inet(0x2, 0x3, 0x80) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r10}}, {@uid_lt={'uid<', r11}}, {@smackfstransmute={'smackfstransmute'}}]}) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/user\x00', 0x2, 0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = openat(r16, &(0x7f0000000900)='./file0\x00', 0x20000, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r18, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r19 = gettid() ptrace$setopts(0x4206, r19, 0x0, 0x0) tkill(r19, 0x1e) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r20}}, {@uid_lt={'uid<', r21}}, {@smackfstransmute={'smackfstransmute'}}]}) stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)=0x0) lstat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r26, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r27, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r28, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fstat(r28, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r30) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r31}}, {@uid_lt={'uid<', r32}}, {@smackfstransmute={'smackfstransmute'}}]}) r33 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r33, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000003500)={0x0, 0x0, 0x0}, &(0x7f0000003540)=0xc) r35 = gettid() ptrace$setopts(0x4206, r35, 0x0, 0x0) tkill(r35, 0x1e) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r36}}, {@uid_lt={'uid<', r37}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r38) r39 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r39, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r40 = fcntl$getown(r39, 0x9) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r41}}, {@uid_lt={'uid<', r42}}, {@smackfstransmute={'smackfstransmute'}}]}) stat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r44 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r44, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r45 = openat$dir(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', 0x400, 0x68) r46 = syz_open_dev$sndtimer(&(0x7f0000003680)='/dev/snd/timer\x00', 0x0, 0x501040) r47 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r47, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r48 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r48, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r49 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r49, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r50 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000036c0)='cpuset.memory_pressure\x00', 0x0, 0x0) r51 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r51, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r53 = openat$rtc(0xffffffffffffff9c, &(0x7f00000037c0)='/dev/rtc0\x00', 0x60000, 0x0) r54 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r54, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r55 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r55, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) pipe2$9p(&(0x7f0000003800)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc4000) r57 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000003840)='/proc/self/attr/exec\x00', 0x2, 0x0) r58 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r58, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r59 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r59, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r60 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000003880)='/dev/loop-control\x00', 0x4000, 0x0) r61 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r61, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r62 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r62, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r63 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000038c0)={0xffffffffffffffff, 0x40, 0x8}, 0xc) r64 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r64, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r65 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r65, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r66 = openat$uinput(0xffffffffffffff9c, &(0x7f0000004040)='/dev/uinput\x00', 0x403, 0x0) r67 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r67, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r68 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000004080)='/selinux/user\x00', 0x2, 0x0) r69 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000040c0)='/selinux/relabel\x00', 0x2, 0x0) r70 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000041c0)={&(0x7f0000004100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x30, 0x1f, 0x5b, 0x5c, 0x1e]}}, &(0x7f0000004180), 0x43}, 0x20) r71 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r71, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r72 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r72, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r73 = getpid() r74 = getuid() r75 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r75, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r76 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000004200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r77 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r77, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r78 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r78, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r79 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r79, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r80 = socket$inet6_tcp(0xa, 0x1, 0x0) r81 = fcntl$dupfd(r80, 0x0, r80) ioctl$PERF_EVENT_IOC_ENABLE(r81, 0x8912, 0x400200) r82 = openat$cgroup_subtree(r81, &(0x7f00000045c0)='cgroup.subtree_control\x00', 0x2, 0x0) r83 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r83, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r84}}, {@uid_lt={'uid<', r85}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000004600)=0x0, &(0x7f0000004640), &(0x7f0000004680)) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r87}}, {@uid_lt={'uid<', r88}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r89) r90 = socket$inet6_tcp(0xa, 0x1, 0x0) r91 = fcntl$dupfd(r90, 0x0, r90) ioctl$PERF_EVENT_IOC_ENABLE(r91, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r91, 0x0, 0x11, &(0x7f00000046c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000047c0)=0xe8) r93 = getgid() r94 = gettid() ptrace$setopts(0x4206, r94, 0x0, 0x0) tkill(r94, 0x1e) lstat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r96 = gettid() ptrace$setopts(0x4206, r96, 0x0, 0x0) tkill(r96, 0x1e) r97 = getpgid(r96) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r98}}, {@uid_lt={'uid<', r99}}, {@smackfstransmute={'smackfstransmute'}}]}) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r101 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r101, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r102 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r102, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r103 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r103, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r104 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r104, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r105 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r105, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r106 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r106, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r107 = socket$inet6_tcp(0xa, 0x1, 0x0) r108 = fcntl$dupfd(r107, 0x0, r107) ioctl$PERF_EVENT_IOC_ENABLE(r108, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r108, 0xc0502100, &(0x7f0000004ec0)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004f40)={{{@in6=@ipv4={[], [], @empty}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000005040)=0xe8) r111 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r111, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r112 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r112, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r113 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r113, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r114 = memfd_create(&(0x7f00000063c0)='vboxnet1}\x00', 0x2) r115 = openat$ion(0xffffffffffffff9c, &(0x7f0000006400)='/dev/ion\x00', 0x2, 0x0) r116 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r116, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r117 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r117, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r118 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r118, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r119 = gettid() ptrace$setopts(0x4206, r119, 0x0, 0x0) tkill(r119, 0x1e) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r120}}, {@uid_lt={'uid<', r121}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r122) r123 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r123, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r124 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r124, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r125 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r125, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r126 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r126, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r127 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r128, 0xffff45ea}, 0xc) r129 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000006440)={r128, 0x0, 0x8}, 0xc) r130 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r130, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r131 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r131, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r132 = syz_open_dev$evdev(&(0x7f0000006480)='/dev/input/event#\x00', 0x3, 0xf08206a2ff70b9bb) r133 = gettid() ptrace$setopts(0x4206, r133, 0x0, 0x0) tkill(r133, 0x1e) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r134}}, {@uid_lt={'uid<', r135}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r136) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r137) r138 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r138, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000067c0)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000068c0)=0xe8) stat(&(0x7f0000006900)='./file0\x00', &(0x7f0000006940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r141 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r141, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r142 = openat$ion(0xffffffffffffff9c, &(0x7f00000069c0)='/dev/ion\x00', 0x0, 0x0) r143 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000006a00)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r144 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r144, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r145 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r145, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r146 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r146, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r147 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r147, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r148 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r148, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r149 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r149, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r150 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r150, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r151 = inotify_init() r152 = memfd_create(&(0x7f0000006a40)='vboxnet0\x00', 0x3) r153 = gettid() ptrace$setopts(0x4206, r153, 0x0, 0x0) tkill(r153, 0x1e) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r154}}, {@uid_lt={'uid<', r155}}, {@smackfstransmute={'smackfstransmute'}}]}) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r156) r157 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r157, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r158 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r158, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r159 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r159, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg$unix(r2, &(0x7f0000006bc0)=[{&(0x7f0000000300)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000380)="bb65ba02a2c60196312d92849b16476e63b407fc1276f42a82bb9a2894fb27997d30f52df45d7c5c97ce1f3c0be2e01f189be64ebfa602f992ad718a076a5a595761c24e90ca59e685b7309054a4ed397d53479179b06961d2455ff05590d14e3e81cfd220be1176ee93d60e00645807d6af7a0c8082be88c9cb26c7df3839688af1b38438de6c51f3b6d7c2f87a0f354bafaf126c43370125dcf0df0304b11280d02fcb92afbd50c05962b93e33b4c2861fb8ea0de87b54e81ec87fdfead1d60c1d1aa270ff6845563b696b4ab178", 0xcf}, {&(0x7f0000000480)="7551a3a82e94ccdbf0db8a3800888a5a63083d9ab01ee8a385abf2a639883306189ae186b25ff52753133b3f5d54e1caecf7ad33e2742837af305f161e93cec8cf7c31f201c640c2b425fb02d63873523dfc4d6287b08db15b4f5d3e3b6b8ac303f01d9d2b995e8478ccb259f66b79ef40b277e85153", 0x76}, {&(0x7f0000000500)="9e67c47c7d55d5924d8bca4abdddfa13de6b3f47f9e7f294071345ca6e3fc4de234d2d12cfd1ed19e0b4a4af18fd52e3378aff91e9df0a44bbd467eb90ef876751dc6b6a7eea1d3e27f3b3f7d6f8ac488e47aa16c1b8f887eee087898efddc09e0c47c6f046cb72befc0c4d65d6b756f695146ef072b678dd952b7db494916ac7d2f2f37858c775cefeb7226612640dc4b93a648", 0x94}], 0x3, &(0x7f0000000940)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x18, 0x1, 0x1, [r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r1, r11, r12}}}, @rights={{0x38, 0x1, 0x1, [r13, r0, r14, r0, r0, 0xffffffffffffffff, r17, r0, r18, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0xc8, 0x4000080}, {&(0x7f0000000a40)=@abs={0x2, 0x0, 0x4e22}, 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000001ac0)="d6d2f62962cf3a1182f290a8f0be86fc180de99a08aa381e84e65e8fb0e0be8615b22b71fb46186076338e184932984dc5ad5f6accfe0847163a4e38c76c3a213e5c9d53fa9a4267732df4710741ca2c7eee33f43b8172e1498ed3a8709b0be8393d49aa2c586c4fc490178d61ef0ee2b0b08dcb5665ef3a", 0x78}, {&(0x7f0000001b40)="828cb3bdace81ba080611f4a9d27fe6ea0d91d0f28c8a748c975f0c3fd7e57888c9911517c56b2dafb19f42d790cf62565da3081b7b22446a9bc442645622e546a2e7e59f0612a1b3129c755d96d67194d2df2519fe516c57ca506b3b93bc187478bb6fe5e617c83fb4cd2907c446557f6007d0218ecb3ff298452013f7179a7fdcbb3c43f38033afa0699517f632f32b3ac8e546d304f5907357049e872a02e7679734f3057e4bdaaa29b1fe1c7d72effb0747dea5dbc6ae65bd7fcb3a4cfb4", 0xc0}], 0x3, &(0x7f0000001d00)=[@cred={{0x1c, 0x1, 0x2, {r19, r21, r22}}}], 0x20}, {&(0x7f0000001d40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002000)=[{&(0x7f0000001dc0)="75f4bd70db7bf18e7fdb182227d7b5d11a139167e9e40ac9c9f5a852bcf0bd4ebf46", 0x22}, {&(0x7f0000001e00)="707c38a9dd304611eec2a5e566312ca2", 0x10}, {&(0x7f0000001e40)="60e6a1", 0x3}, {&(0x7f0000001e80)="bf5507a101a867510fe121b588062ad24fccd3727abe43a7", 0x18}, {&(0x7f0000001ec0)="f0caea7edea0a0cfd8e5a90f36e85315c73bce9d68addda0f0eb31249717754212f4074b9e9a1020beb8e863bb39969ee2c0921c2992d3ebfe8b6a49d7524d34db448da60ec3cf5b8e3ebe3c08bf6b44c1d3c4a0b99cea6e995c0c3592ea0d87eb", 0x61}, {&(0x7f0000001f40)="096e5005416ab75c1c9973e05a8d15ac7f4542d35722be835002a4c49f1a2ea3da01672d5954b4323e028a1d2744b9a4caafd9221c55bfe6efc915d4da615020c6e8da495fb9118e8606e835b8a369f2ecd0750465f17c903ab81a22bb04c9c4d8ae0f1e93f0656d3ae1229bba4f731bf95401acfc92728832516ee03e1acd73ddfa7dd43f6974", 0x87}], 0x6, &(0x7f00000022c0)=[@cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}, @rights={{0x1c, 0x1, 0x1, [r26, r27, r0]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r1, r29, r30}}}], 0x70, 0xd84b72294e3af2ee}, {&(0x7f0000002340)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000034c0)=[{&(0x7f00000023c0)="098488870c95dfc526b9d6b44d6d4abecfd36382f6ecbebf311661b763330aa48d3df2e6572ac431583e4368a4d1a3fba3b54663dcbcf5bf472da248ee8595a0d702020ea2436032f56b2fbb8a8f71f3ba1b28a451218ae990e09fe5b2d5313dc76624bf9ac93e0242c0ca9d2e12829fc9294e41fafb17f5e0808178597de2c714b0b9323dd522adf6cd3d3de6caa9ca9cc1935150ec7d67d9664f83473eac0e209c793bb9764829bddd", 0xaa}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="5d47228857bafbd5f49074be1a8c102ded2b3e05d0eb6db3c7a4ba54b9aa258c9ec05c6dfb4f614c5a4b78", 0x2b}], 0x3, &(0x7f0000003900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r32, r34}}}, @cred={{0x1c, 0x1, 0x2, {r35, r37, r38}}}, @cred={{0x1c, 0x1, 0x2, {r40, r41, r43}}}, @rights={{0x38, 0x1, 0x1, [r44, r0, r45, r46, r47, r48, r49, r50, r0, r51]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, r52}}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r53, r54, r55, r56, r0, r0, r57]}}, @rights={{0x28, 0x1, 0x1, [r58, r59, r60, r61, r62, r0]}}, @rights={{0x24, 0x1, 0x1, [r63, 0xffffffffffffffff, r64, r65, r0]}}], 0x140, 0x44}, {&(0x7f0000003a40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003e00)=[{&(0x7f0000003ac0)="29660d799434f78fd2cb4f6e26e0354db89317c953068dc758a29024ed1337a00233d03bf3fb80196facc84af1e9ec5cf9f17b63d3e5b1a904c22ddbb08c929570773e1df6eed12aa94d53475871eca4195e58695849c0c485f77570eeb6412802f8f21b6f1cc440a6bfe383a656f136d56ab96a65608f605dd7db33ddec596d42753b9588552ab98c7e441ef1d30f24c6f6f9d856eca9f60614833c9aadb86edae24a50b86ff524cbf7453ed75c0bc26b446d33e3df63ecee2986", 0xbb}, {&(0x7f0000003b80)="2b3f9a13038b484f68677f045d6bbe4729daf96bb6ab60846311ad6cbbfa5324dfcce85fc6acf66231ff7d5f3c05d35c7e4fb376d8c5ef8cc0b6755571535757c584b3a62f4049a32d19771524ce83145d9f36f0590320053b77a1f85603e3c38207b661ac482357de6cf3e7465908bc803774d98451757b3feeb9fcb58aa960938ecc120430500d7892380f", 0x8c}, {&(0x7f0000003c40)="8ad82390cfa3548b31e2ca2e0ebab3615d865a1d2702491d37f51f58dbc94c51115781056e612fa88b1a7955125e26c71fe45dd1ef68eff6b4c9d4ced9ea76d7339e8d5e7fd5a857cdc7236d24833a32236ae9ac544fc08fd3fc85333fac708fe58f2c659ef84850a492bd8111b6c87bb8303f76ab48c7e67f25c985462f4e7d0cd68a1aa159728dae6e7adb81e51679fa05eaa167f397f6b6d2d2b14bc31772e8a696807761a07f4c0b3c15fb0151a8ee56a3fb0885b0165ebdc73cac06779c", 0xc0}, {&(0x7f0000003d00)="64934d1b80b9761ed2e4645024761ab6f76671e49aca21d25c9a36f5a95c12cb2cd8f3eb362ec8e6b54307a1cc6c85825924e21ee73f1d78cad40b4d301da4a684e2e915a0175dda1f49218f64ad4602899e48388982c1b5957e7ce09497ab3eee34f05550aaff4dc2e900b66088b259b4d5aa542a29a48a261d5c4f0fb37cde4f4c523bd5a85ecd96fcb49b026ac90f049d9ccc9628f87071c06cdcac1fc8834804bda8094f97827ca9b09a26d00e922458ba676514e4397c65955c1e6dee05aa3016ad2776e082a160", 0xca}], 0x4, 0x0, 0x0, 0x44000}, {&(0x7f0000003e40)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004000)=[{&(0x7f0000003ec0)="a0add9e635885ec52b578179cac8190f7570d7335b39d9adb4b0c2e7683b688f794aacf0c301f604c8c6fbdd671e956be921f523304f22984d511321ad12d268fedcce3e1895891a8928fa2af285ea4e682e4646f149dafd4abb38f931e9d2aba8f692ce3b2862a4f6a1584db42232b8cd30d5ef4417a5a4c14c7cf2e3a1693dc5fa62ae", 0x84}, {&(0x7f0000003f80)="a4169f61a09a7c13ad2e17f33508430973e1c02733392620cf6a175e87dba706b0a34149f0547da3484d3a96dd428f7526db8d5adea7f128fd79f2277f2b74ce3a3279e5ab4a4ddadfff6fef5e46f501ac7e511300868762f37f8e394cda8c5c", 0x60}], 0x2, &(0x7f0000004240)=[@rights={{0x20, 0x1, 0x1, [r66, r67, r68, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r0, r69, r70, r71, r0, r72, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r73, r74}}}, @rights={{0x30, 0x1, 0x1, [r75, r0, r76, r0, r77, r78, r0, r0]}}], 0xa0}, {&(0x7f0000004300)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004580)=[{&(0x7f0000004380)="c17593c95f1d8f1cf0929af344bdd61bd6752767208eb7", 0x17}, {&(0x7f00000043c0)="ae4242bfea", 0x5}, {&(0x7f0000004400)="556efa4dbe5218da1e0570f7d3dd19cd91119dafb45613506dbd6c4325af9fc7311dbea2bf227d7de2b08ec123e7880ae83a385b01144261b9efbadd42dc403790627cb6a4c470e9153d0fa5bae8ba5e09827d8455521f11a1f62b1b0018d437b906ab2713a39cfc64cc6a5c771cff536a0f8135551909e953c8dc1395ea29954fe8c225f02d2f72cb130f99a4c750265b090c1676acd7e22624663bb374c42a38ff5f3e747c91b10a0e2f8c1a29cfe2d4cf03ad8ebfbf626627ba3d6453827a780f549acf458b9ab48dfda7922eb8440f", 0xd1}, {&(0x7f0000004500)="1e54eb9e291c03070d8916122398b14fd0e9055d9b0a3e61521b074a8dd9d5f5a7964b1ad508ab21cb24d5bab9e8236aa430eed458eb2e5bb298c0dc23b02df25777449cba2e9d9e3b1eb736d7a5d73a0c5053b7136c1951753f", 0x5a}], 0x4, &(0x7f0000004980)=[@rights={{0x24, 0x1, 0x1, [r0, r79, r82, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r83]}}, @cred={{0x1c, 0x1, 0x2, {r1, r85, r86}}}, @cred={{0x1c, 0x1, 0x2, {r1, r87, r89}}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r1, r92, r93}}}, @cred={{0x1c, 0x1, 0x2, {r94, 0xffffffffffffffff, r95}}}, @cred={{0x1c, 0x1, 0x2, {r97, r99, r100}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r101]}}], 0x108, 0x8000}, {&(0x7f0000004ac0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004e40)=[{&(0x7f0000004b40)="c054a04270fa70bdf597323a99446d9d535931eb10506214d666a7b0753a5b27f8a38c3833d3c4ec27e7f6eff527b374ebeb108068f4efc97d59f89d9d19343cc5e110fa43cc69b6824abef2fac6a1e1d8226431c2bd392387d1b2846cd3648873aaa2c6a2339c51a54b6c1d4c5fb9b4d43f06cfdb615e4bba6063d54a67ec4ea6c2bb20366e7c9ed03b129b705b821cd37d9549e17cea148bbed618d362e0600404f544bbd1e5f8ee6cae0e55079fd5466e9299218e31f17bd9d299acffb6bd594974e59510086f0d168e63c6d59e2d0902f6a0a39a8d031da4e96f7d40", 0xde}, {&(0x7f0000004c40)="f5f8b1dbbfb7a32ccd34649caecac6a28b9e9949d62b7de5cc476cff", 0x1c}, {&(0x7f0000004c80)="25c015731539773b95e1b1a9b46e908e0d1fbd8ae0a9296c9324e5e709c39d948468c209aac099c50906dc61219d0b3ee111f1f3caec3921d0", 0x39}, {&(0x7f0000004cc0)="ca16512483d8943973e9cdc44dd2803281b0dbdac299988433612c1722f5f4a474e013b92446f380778174d9136d1394894113b66537e2c8a1d9e4f477a4e666f123df5dd65e7643d25a11defb354579c9d6f1d103f3437938cfe3a2b36a0bd8fb33b29edaf1c0b7371976d5b20cb3ea8d56838bea", 0x75}, {&(0x7f0000004d40)="5b62046595f200a98f679566ac180d964da99ef498b905795803def683ce", 0x1e}, {&(0x7f0000004d80)="204d5c569b78401bc4224d9ff7dedaca3367483898daca9991844f184fc8e741e293a95cac56d92567da612787fb7eb1ea77c73414f8a8f0935621e9f9bb1841d7a15552a150b8fbda1123c69b0ee662b1f6b0b25fe748717efc00cde5f2be3987560d243c92775cc402f5b083b45416de012a6b9e1bd4b421a81aeeffa6264c0af6dc427236f178a48e9b2f62db087ea31e21ae552f8de8e27e67", 0x9b}], 0x6, &(0x7f0000005080)=[@rights={{0x34, 0x1, 0x1, [r0, 0xffffffffffffffff, r102, r103, r104, r105, r0, r0, r106]}}, @cred={{0x1c, 0x1, 0x2, {r109, r110}}}], 0x58, 0x20088890}, {&(0x7f0000005100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000006340)=[{&(0x7f0000005180)="6c12a7b582e06862eb199d6e0fd67b292dee64c64715b2db8748b1f175925df9d4d1c22901ef5745769cd120a858903e4cfd8cc71c1a1de7fd5d9979cbf0623566c14bb9ce31e018425d93df0399849741899debb78fd7f618831a27440964192c4e2fb6be87f250d354ea8bbe9eb25ec2edf8bbbb541bc01e1d6efc96261ab553d2191b5462db98b2b14a9ccdfe2cba79a3a5c86c7d1a4395afd429c9eaf2fe86bc9f5c16966ef259", 0xa9}, {&(0x7f0000005240)="08d8454f7433f34b6e2f5cccdc1bd8fb128f7985c3360a7c8ddd7d0c9a7860fa0e", 0x21}, {&(0x7f0000005280)="823f52d9391dda0d629958e6ea26eae5235cfc3ad7e99a3e76251d033c0dcac8052f5ae7cc07ba48c7fe2570b645f79751c1850c44625c01214a150c8cd008a29e40dc46f9e013b8da618f7b6aff9782ce523726a533841323d8dc6731c287fa9e50b267397aadae65b56a3b4baf6b63f8844e7c2c7f43bf2dc37b33fafdebdc1c57e8d9e0a231bd4b2e5f58a6fd080a3df95fa309815a62d107ee67adcfc543f998f66b5e52404e8951140f944a9e34629a6be7b41de7daa3f39beaf4df052b62c751a9af6fea4dcd46b4affdf0e1ae67cd5457a811bcf6b0e9b15273365e6bfb664f857d87eb7b7513376fb8244a7b6a7600fa264a1c526784858aa92aa597515ad3603fda3324c3835013484d43b705b9fed472665b648fdbcc7b83d6f9e51734bb9f11096c5db13e7b8f27063e3ea09fe76443b7b5d1c7984bb62f545500729f1390f8414fdb5022628ac8c329d6eac1f37982a5c15b9776baf3422f3c14448c929c70c7824c752cbe3a9ebdc4c8a7abcd99856a1b5a30af3b696bdf095d0cc8a473d4846f7e03276870e976a658efc40d6ab949041cd7e89c6e2f212735f8a2bfa6b8bc5ce1aa83f864f90ac89a15bbc2f75ab598b7ea5a72bd672489eb31ef618702d204e5383c6c67db57156cedae801fdb90872caa6126b8498188233804b80ce77f07d479ca10f55cd8508bb92b1c0d0c70d8bfcf609ff50e6b830c696332bb4f410a3b70d6811cb1c4dff8696a7627c21a72e5d60e201d127508bc5aab826a528da9f0136305956675d47fa1b790d2367ffcc5e5b56083676c55b37293ea5593a08491ed9f945e45a9d919377c1ba16d764dea54b01c715eaca7ab163d9b2c975cb223f4f05da4192c15607140c769850a05f971932ffb476885c9f8029299a140b3e3585620f1ae62775b1e91d5e9d5308691c91933f441f1184499cb0a064bcd01df7e6663066ec6a4f58830c965da3ccf7fba87eb2a26800466ebc723fb720863fe6c5496be6dd388816f7f6c8e06459131a9b4706764c73331c4d58761c20c4dd25b09baccb6518cc51c97a8c28d42e1d9dc6832bdc5221c4924af967a5f4cbe6110e46f3440ac9fe6a6d44ae6d8371cae2e0bc075fcb6f041bfbb142597ad67402c8abe1e0ef4246f8aaf022a7c0e835ad9c4b579ccc4e1d0e5f13c0e5a21fa71d91c2418a7b1e8c02a728e11a0aff3eb15732a3e88ea402a730adc5a7ba19a116ea5c464bea163ad6515120d93f2c042ffc16be07a12122d942de0d872f268b737ec22570186a72669df66d65156127a7ca40c4f460462e9fa3122ce2b250cd6b32ba3fbb86ac803068d458cab0c2899553859a636abdbe8811acc392c5c8945ab79c289e7ea48ac12b860a9668d6294ada8be019e7630944a14f2401376c39558112459de0b1f23f6d14041aac62925bbf878eaeddd878567dc3d607fea238c5cd4cc2cc88ebc3105e6a7f02ff704a9bc83a2d659ca97d0d5085c4cb9dd1d54ea9b739ccd1123ddf040daefb51ed912a25343079f96175c7442bceaa984e3fd25eaba11511c4f9bfb02fe487e32e0cad1781232832bbe51235d2edd53aaeb63c19690db0367e3aa95ea329f75ee87711f8fc3d7d9c65ebe58e77f649a3de3d3a50456d1564f92b4e424ff16586fb74d6c987089c3573a19ba5334f976d5e8001a110251f8201d9a6616d2904478106187d09c02a85f16df41a1badce85e2f1d89b2dc73d34c0b4c28498352443255fad9db7509f16db440aea45101e91a71bbeacd9a6d6315d14f2620fec8719a088cae8c06664bf74fb8ee00d78b0eaba5a88c1fffe6b091d310b53042179d4e69de1347fff3adcdf5a7f928e219f993f570fe52420faae14c074f419763914a0fc6085b02d8630043e7b277a19cfc03f1351b5d1ff9592c5c34f31c05492c8b5dbf6557a87f346e65734b917c5e953c94f1ae40ac52df221164266e4307146f59196f820c8c92f3a8a265aa0fc94cdd2fb4fbddadd1cbfd36e86d5b11fc731e97bd975b7d2396371f77a520325a3852e0916991b0183bac17648c4864d4a869c0fd74454f8a3c394a91a443714e31df897e064c345ba30c0c7bf453af4dcea9a02edef5925785e579a0790821f644ace98de7fb32769099931d20147aa358fc95ed5ff71ce071c5ffcc8048ee29ed7e70bbb85287bed014fa5646338d83973644fbe0e6c535918b79552a826a6f7426941458d5d1e6def679075f59d148a75b28a218bc53e085db76971b4282aada55e068d72db4e1e3832339b8f3b84b632529ac2d93470dd6e0b1c310307c84345017ba943284700ef09f6b59f282ac5699e650755117051d77f2e76d83bbfde531c443b5e21ed99eb5d199e34099c5e826efd2073fe54d68e35aaa2b2945bb80561bbca7526dcf3fe5d21b79a369b18d191db2097cc33343f9fe3ac2bb25b87f93cc8294042152f11fe3e07bd7e2e73cb950a90dc9240e2202ca656274b8498ab17c463235c7e9a617995dc4791f7965fcf956255785f6cdcbb24d71540df17940fcb0fe614915008f5f65e353d932a2fedff88c5554301de6f33bf7000f76e1c653ceaebd5998829dd8a29eaed5afa1c9216df0cddfc354933728acb15bbb6218171370b22ab7f6572a9db71a0bf344e2e28ef4dd9300d8333c123a8f7ec7f709cdb5cb2c79f79eaaf066f453481ad39d2f2b029326313d039899933c0c7b404b0ae4a3b760c2e7697f422804e64d48f4f7cd9fb7bb82dae19d841084dd96c9d95c0b2f27383e79c4174dc631737247dd1680144fd1a13da5591dadf602ffee210bcbf3b6cea356545e24a806c33a27d8ad3b04a091b4469ac2498a8ba02fc56c6d4c87ba9bef0c58eb38c074702b68226e14a1b0585d20c68f3f7ef7d458cc468d63e7d56fc1a2e5303f95d629b65a3a3e70f54eec854e4b2104a855a10b112c7ce545c0b0f83c2a62e78fa64dde1f82f532c44015df7efb3d51abbfa4195b8b5609692344705ce7b0573c2755b4b7f806760a8c939c7df523abe6a543f971b59d9be17c9c6414d3898246c71215fd3c05ae9b91620b8318ff1be95fc2bc4168b28701d37a0428b60af8f26585b4d768ee22a1f798e69d5e009b85aaafc1a2285ccffa53999f05fe1b5577c9d041bcf286899e77340f1f2a88287e43b5a7c25e98aab299bfdf92dd10b21030a35899d472811d0bbcec1b483bcba86303a86beb1c621e227a2f691733a58a24518956b53e758b6c0803d366021761062ff08283de16660f7f9843f3e209e3e8a96171e9f997dfab09b3baa11ff2fabb8ea84a27bcd27416a1dda5322b9cdc8b3ddec461d58aaf69cfd2fa078fc45b47f0d8909bc827678c2abbf7175902cbcb390a1655e17c61ef19123b0f3421ac4a18cef4b3a804d853a1932cdd5b07febfd8e6f750ae29f035acba4b070f8182563df4dc510bb36cf529e4a85bbb9dc9be0e648663d5a254e196ce975fdfb6aa4e21e8cdee7b5fd5cbae8e3dc7fbb7b5909ef4a385b751ac8e5471d2411055e5f590c74a89a852b6186fd3b910917d7bc75e8944f18a9a3dd9cafde32a76a4ef1dabe3a4a3b816387dcda3559a8b64d08fb04b9d63b8bb1ad9a45411079b432a67ba1a62b2c06e9cc3ab81c8eab4c948d57876ce9804f36638b0bc3d9c108fffe5e897827db5ec4dae4f5f0718c5c8f8bef5b681f863c07305cae777677bb6287cbb024b31ad5c454a59dc2be53f5039cc7258faffaf69d7c0e94a828657d8fa9f230651a3b9c951d1b0bcf76c4ecaf8d501730932249d53c5d8f0df4de1035ca0cae9127336f4eaa02de9e4adef9e27d0345c76d184cff481d4a7e0e6ad665d6ed86aefdc6d3fc59851f3b548b61cddff02d8e0d36586eb68682c836172e15df9890faa412098cd48f368445cc4561cf80b8e034f3844e31924f2ebb82c7add3d839ff1f7788b6eb7ddf3b4ed22690a74d1834c93c6590dd1646b015535100e80505373f932b30fb378aa522d5c120dfaa8760de83c5fe5d0d2caab5012330cfe7d3ad56642b78c2518429a4e4f21bfa33d816bf5fed2f8099a6aa843e46e2cfb6660a19d5b81e3ed3534ffaa0d05da790611b88aa739c94d4e2c432dfca15668bcf4dcd816157957582d3d64903ac1a30195f04a3a99745b846a5d175e4985867e4c9ac50498b4f4a27e220beabd8f997f8e4be8fee65dba7328f074724be518a8c5f73ef9eb5b1e3ccbbf39e879319778eec0d158ce2edfaa8d02ea6a6367f6cef78c88d83ed98dfc9409df6871a035df8060596b10cd79023e7053dd46ac59ece7e00e02a4390dfdcc4ea755f539eba10903c799cc6d0585755293a4ccb82b5c9f72c8f29b25bc5fa232fd0deaa0ad75f3d82b4bdf4263254beb638242089ec1f300b63af27855a38cdb3dce8efa6b87c12b60017f905722fb6d11f33e3e6b86e225240b3750c6adf00433a7b5fddd4704c45a59755b8842473b9aee376d959468c479f943fc74ce1616f7f74576cedf8a8de0cc7c4e291495c94ef38f1fa93a8312a5378847c3bb8c8323df56077a3c0045fd86789e7edb1ae59dc1123a4b9ccbc0f9444431b6969e0d2fc4ab175870a2c4a7a8d1ac4568be521612e218549dc991799aaaa0de9ca1f950b462396969d729b0252b03b27edbe1eae3c5126b1ff2f4974d56b1fb63e7ec60f20516e1b662b864def6250db5deb3fc0db363115691e670065f65bef83bbe09af81ccba043c72d74ede048de8e304a5de6be42abc1f34f9c3182835cc69a7b0ba9f3a132cc54239fa1e0b9c488f4407b8abcb7e0a79b8a4ec70376d4ad6e88f7afdb210eed375eb7e1908b531ae463a44b6354d31bafef60e6829d432957498adfc31150ca25100d8df13cf3e7a67292a0443f308b5f1cf9759a1666caee4186fb3335d2ba57911782f91e22d63cf68920c526edbde9ea07f6a65d4b3dac4f2a39c8c405c545567320d917fe3d9cc0ad11a14d44d4c7bdbbd21280472a623e250d38519ea8d13cc120f062449fab9579a3ae9b8b5039d2e49da1fa630a0e7cba8725f92fa6bdaf37dab102423535b5eabd81dbfa6aea1b250391462d975189b753f4adb0016633f3f353f104cfa25286c16779ab191c44b16286c0122f1c26d177fa1c4aa1d789f0991922b743dbd85f766f927fb0dd445dd332b096996369afcf1976d880e4052715975bde39c6a8c5c32290faf609b6787a4d6675764ab5425e563ab4109e649d650cc4e201ef9f6dbb69af2080d588cf35034b75b19b736b7246fcbb53415f34f27b0c461d9bfd757ae1eb93f50ca8448c8f53ed33297761d8fea99729f39f716daf2a81bef75b32a103221a921cd4fab2f816096fad1c34f47e8f45fda2c47570b4a3c9a3cf41672707dbf9dfd334b545ad2c1b0cd1e99aea1b426b8fa0124a6e859fbc0163ea9dee3bdfb5dba641f37ae61a7c331831f0ac2308e616b564983fc7f7d202b8b2a7e8e94e8a5928ffdeadf14dcb2464bda8ba57fe172db42ea7719daeadd03dca5322aeac0b69fb5c6f5bb8cf512609db08a0d48af89b371b23c0240e1e81c92444d6003eeff6e7e46b2d6186ef8a1a6190e28ed2d4b2138ea458c31bf4b5b098abf090f20ca7503a961fe8599b8c7ceb39615cac7b84b4652aaffed7c46a0216fe183a27a446ed902638694fb9b4a693ad40abe0d8db43c489e517d27ed196ddb2d53dd1b54709647603faf243d8f8823af5b263ec3fa22a62ebeffc0dbfd23fcc7933bf1aa50aac4a1f971b7eb7e5464caa5cda865170eab7ae63c00257f35b0a500", 0x1000}, {&(0x7f0000006280)="569a808e", 0x4}, {&(0x7f00000062c0)="d68509e1456b231a50b32297", 0xc}, {&(0x7f0000006300)="45818f3b543a1f977edbdd46136aab00f123430edcfe03a77e75b95ea10cf0035ed76b9ee515755d35e4100a8cc4", 0x2e}], 0x6, &(0x7f00000064c0)=[@rights={{0x24, 0x1, 0x1, [r111, r112, r113, 0xffffffffffffffff, r114]}}, @rights={{0x2c, 0x1, 0x1, [r115, 0xffffffffffffffff, r116, r0, 0xffffffffffffffff, r117, r118]}}, @cred={{0x1c, 0x1, 0x2, {r119, r121, r122}}}, @rights={{0x20, 0x1, 0x1, [r123, r124, r125, r126]}}, @rights={{0x30, 0x1, 0x1, [r0, r127, r0, r129, r0, r130, 0xffffffffffffffff, r131]}}, @rights={{0x20, 0x1, 0x1, [r132, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r133, r135, r136}}}], 0x128}, {&(0x7f0000006600)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000006780)=[{&(0x7f0000006680)="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", 0xfe}], 0x1, &(0x7f0000006a80)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, r137}}}, @rights={{0x14, 0x1, 0x1, [r138]}}, @cred={{0x1c, 0x1, 0x2, {r1, r139, r140}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x34, 0x1, 0x1, [r141, r142, r143, r144, r145, r146, r147, r148, r149]}}, @rights={{0x20, 0x1, 0x1, [r150, 0xffffffffffffffff, r151, r152]}}, @cred={{0x1c, 0x1, 0x2, {r153, r154, r156}}}, @rights={{0x24, 0x1, 0x1, [r0, r157, r0, r158, r159]}}], 0x110, 0x20008004}], 0xa, 0x40000c96) sendmsg$netlink(r0, &(0x7f00000098c0)={0x0, 0x36e, &(0x7f0000009680)=[{&(0x7f0000009440)={0x10, 0x3a, 0x1}, 0x10}], 0x1}, 0x0) 03:42:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r6, 0x0, 0xb10b, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001e005f0214fffffffffffff807", 0xfffffffffffffeb8) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffffd88) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13082f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) 03:42:30 executing program 4: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)="1b2cb12dc8e64872381400e616fcdc0d2584683b917f36f91f508ec5c1268fed20f56b11448b0bbc2bcbc9c6a6592a929b04dcecec767b6220f2eb539c149d6379a5ce94a5516d94994426421fca8b045dfcebd32c350c1637d7f2ed8266583bd2d802c3bdefa1b697e326609c8ea19583a74895df7164c7c1343acee57ca493cc423df61d7d3230de22cbab6ab5e15546daf3a9a6faecaf986e892486156c863b866f91557594aee14f3cb0cd9b9d022447ca5f0925ccc5bb03a2ad8622e2ed1fd385d5ad36325257f338996ba2c23e81fc1c484077c9f378a3aad24139285b7eac36ca7b5b783f474abff98fa3adf9b2", 0xf1}, 0x68) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) 03:42:30 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:30 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:31 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x4, 0x2, 0x1f) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x4, @remote, 0x4e21, 0x2, 'sed\x00', 0x12, 0x23, 0x27}, 0x2c) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) socketpair(0x10, 0xa, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000340)=0xc) [ 2909.473825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 [ 2909.495582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 03:42:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0xeb, {{0xa, 0x4e22, 0x1, @empty}}}, 0x88) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1400000000000015ed913f195717df008903ff0000000000"], 0x18}}], 0x2, 0x0) [ 2909.510105] loop1: p1 < > p2 p3 < p5 p6 > p4 [ 2909.510115] loop1: partition table partially beyond EOD, truncated [ 2909.510328] loop1: p1 start 1 is beyond EOD, truncated [ 2909.510334] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2909.513258] loop1: p3 size 2 extends beyond EOD, truncated 03:42:31 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r4}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2909.519514] loop1: p4 size 32768 extends beyond EOD, truncated [ 2909.541435] loop1: p5 size 1073741824 extends beyond EOD, truncated [ 2909.575663] loop1: p6 size 32768 extends beyond EOD, truncated [ 2909.776251] loop1: p1 < > p2 p3 < p5 p6 > p4 03:42:31 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2909.780944] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 2909.819349] loop1: p5 size 1073741824 extends beyond EOD, truncated 03:42:31 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x11, 0x3, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\'cpuset^\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/anycast6\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='acreate\x00>\x95\xf4AJ\xe8\xef\xcb\xebc\"\xa3&K\r\xf8\x10\x81Y\xbe-\x92\x931\xcb{\xf9\x9f\xa3Ro9r\x99s\x95N\xe6\xa6\xcf1\x8a\x8cT\x97:3\x8c(a\xb5\x8f\xed\x13T@\x17\x1b6\xda\xa8\xa2\x9c \xc8\x1cvE\xb1T\xd2\x9a]\x9c\x9d\x13\a\xa2\x9a\xb0K\xd2d\x1eg\x8e\xc6\xc0\x94\x0e\xb0l\x95*\x82\xbf\xffS\xcf\xfd\x0f8\x92r\xcb\\\x06kG\\\xd1\xab\xd8\xeb\x8f\x92\x93\xac\xb1\x98\xc7\xd5:K.\xd50c\xbf\x04\x00M\xc2\x8f\x15%#SW5\x8b\xd3vF\xd8_\xf5\x02\r\xd4\xedLc\x89\x97\x1a\xa9\x05\xb1<\xf8\x95wUd\xd9\x1a\x00\xcd\x92\xa1\xac\x15tTZl.\xcc\xb8!l\v\xb6\xe5;\xd1\x9a\xd6') ftruncate(0xffffffffffffffff, 0x208200) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) [ 2909.914631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 03:42:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000140)=[@register_looper, @clear_death], 0x0, 0x20000000, 0x0}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000600)) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) connect$unix(r2, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = socket$inet6(0xa, 0x5, 0xb7) sync_file_range(r4, 0xae5, 0x7, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept4$unix(r6, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x80800) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000002c0)=0xfffffffffffffff8) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_', @ANYBLOB="2c736d749125"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x2040000) [ 2910.005934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 03:42:31 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x3a8) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_subtree(r3, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x1f5) close(r0) [ 2910.098466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 03:42:31 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2910.189413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 [ 2910.276628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 [ 2910.360521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 [ 2910.456820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 [ 2910.565496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28931 comm=syz-executor.0 03:42:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a40)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:32 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$lock(0xffffffffffffffff, 0x10000000000025, &(0x7f0000000940)={0x0, 0x2, 0xfffffffffffffffc}) close(r3) accept4$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r6 = dup(0xffffffffffffffff) setsockopt$inet_int(r6, 0x0, 0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000000980)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000040010000000000000000000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000000000000000c514141eac1e01010200000000000000ac14141fe0000002ffffffffffffff00000000000000000000000000000000000000000000000000cf00ff0000ff00000000000000000000aaaaaaaaaa16000000000000000000000000000000000000ff00ffffff000000000000000000000000800009008100080000000976657468305f746f5f7465616d0000006873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b00000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ff000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaa2b0000000000000000000000000000000000000000000000000000ac141413e0000001090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b997f0629ff4ecb245b4b9ac09716b7000000000000000000000000000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) socket$netlink(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={0x0}}, 0xe6cdd00eaebf97c) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x8000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044}, 0x400c010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r4, 0x0, 0x30005, 0x0) 03:42:32 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x9, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:32 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r3, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000004400000000000010d8b92b763343f3b3f79d6a2f0099aa00"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) r1 = epoll_create(0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) [ 2911.151184] audit: type=1400 audit(2000000552.750:12326): avc: denied { wake_alarm } for pid=28985 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:42:32 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) recvmsg(r2, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f0000000000)=0x54) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x130, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7c}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x378}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2952}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1b6d8814}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x4}, 0x40) sendfile(r1, r0, 0x0, 0x72439a6b) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:42:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2911.479419] audit: type=1400 audit(2000000553.080:12327): avc: denied { wake_alarm } for pid=28985 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:42:33 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r2, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:33 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000340)={0xfffffdfe, {{0xa, 0x0, 0xfffffffe, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x26e, @local}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x300000, @empty, 0x1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2911.690730] audit: type=1400 audit(2000000553.280:12328): avc: denied { prog_load } for pid=29012 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2911.857507] audit: type=1400 audit(2000000553.460:12329): avc: denied { prog_load } for pid=29012 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:33 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f757057bc643d", @ANYRESDEC=0x0, @ANYBLOB="7bf7101a96874e214c4ba733376864689669dfa9756a16cf71712f0e007ace4c2dba21b831fddbe789ed9f6225d3ee794d6bf1c9c21c"]) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000000200)={0x1, 0x3, 0x1000, 0xec, &(0x7f0000000340)="194e73220ff0fa19aa1b9646be0bd53ca26cffabc8c77ec88b9e798f953c221abc016c7b2e944955da0af5767599b5d8397b8e8b5127c22d6ce9bd1f29076e890e40dbe4e80b2761d9b7e7f70d58070c010782399d0ce228ef0cbc5e2cf7718b4e8ad9e3bb785a1c0ce2e36b6eff024c4f6d80ef167dfeed12d8f4180feea709aa544de546ec12431cf452b595ae0c3abc633ddab7ee491ba659ae51a39ac7a0bb930dab80b46fe9d021b73bd92c91867d5fde372c19b7e735c8cc5e9cf0db4606a142f2d2f92b802cc7e3b9569851032c5fbe58690cd2da5083c22ab6808ab2c8238b89675f048f5554b5bd", 0x83, 0x0, &(0x7f0000000480)="dfd6236124ef2bbf33d466eaab88a909927f2af98b8d3207135143f9441d381574224fb4c0e569b6ee30d935e0196c67f32ba4357cc03073d00cb836758214a7950f7eaaa8c2a98976d00376365cf32a53618cd06092302ea677711f9afc598b9312baa233e9be447b8f685263df9732887143453efb2994fe21d0df4945b0693d552d"}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000080)={0x2}, 0x4) sendfile(r4, r3, 0x0, 0x80000005) 03:42:33 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r2, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r1}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:33 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:33 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e23, 0x6, @rand_addr="e2d2030a15bcdf53a189b0186d3326ee", 0x8}, {0xa, 0x4e21, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x76}, 0x5, [0x5, 0x7, 0x9, 0xffff, 0x7ff, 0x7, 0x9, 0xfffffff7]}, 0x5c) [ 2912.291885] audit: type=1400 audit(2000000553.890:12330): avc: denied { create } for pid=29029 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:34 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$lock(0xffffffffffffffff, 0x10000000000025, &(0x7f0000000940)={0x0, 0x2, 0xfffffffffffffffc}) close(r3) accept4$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r6 = dup(0xffffffffffffffff) setsockopt$inet_int(r6, 0x0, 0xa, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000000980)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000040010000000000000000000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaaaa0000000000000000000000000000000000000000000000000000c514141eac1e01010200000000000000ac14141fe0000002ffffffffffffff00000000000000000000000000000000000000000000000000cf00ff0000ff00000000000000000000aaaaaaaaaa16000000000000000000000000000000000000ff00ffffff000000000000000000000000800009008100080000000976657468305f746f5f7465616d0000006873723000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b00000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ff000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaa2b0000000000000000000000000000000000000000000000000000ac141413e0000001090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b997f0629ff4ecb245b4b9ac09716b7000000000000000000000000000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) socket$netlink(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={0x0}}, 0xe6cdd00eaebf97c) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x8000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044}, 0x400c010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r4, 0x0, 0x30005, 0x0) [ 2912.481387] audit: type=1400 audit(2000000554.070:12331): avc: denied { write } for pid=29029 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000ac0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r0}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:34 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80900, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x3) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000180), &(0x7f0000000340)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x8b1b5d2f3ead6cf1, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newsa={0x150, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "e59b133cc78cecc57debbcd162da13cd1a1514ae"}}]}, 0x150}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r6}}) getgroups(0x4, &(0x7f0000000500)=[r6, 0xee01, 0x0, 0xee00]) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB=']f']) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)='fuseblk\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r11}}) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x2}, [{0x2, 0x4, 0xee01}, {0x2, 0x4, r2}, {0x2, 0x6, 0xee00}, {0x2, 0x1, r4}], {0x4, 0x2}, [{0x8, 0x1, r7}, {0x8, 0x8}, {0x8, 0x1, r9}, {0x8, 0x2}, {0x8, 0x1, r11}], {0x10, 0x1}, {0x20, 0x4}}, 0x6c, 0x5863fd3d4ad2d7af) connect(0xffffffffffffffff, &(0x7f0000000380)=@rc={0x1f, {0x1, 0x0, 0x1f, 0x20, 0x7f, 0x3f}}, 0x80) syz_open_procfs(0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r12, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"/320], 0x90}}, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') sendfile(0xffffffffffffffff, r13, 0x0, 0x0) [ 2912.900468] audit: type=1400 audit(2000000554.500:12332): avc: denied { read } for pid=29029 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2913.046502] audit: type=1400 audit(2000000554.650:12333): avc: denied { create } for pid=29029 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:34 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r0}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:35 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/ipc\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fcntl$dupfd(r2, 0xc0a, r3) socketpair(0xa, 0x2, 0xdf, &(0x7f0000000080)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB='8\x00', @ANYRES16=r5, @ANYBLOB="040027bd7000fedbdf25020029791520030002000000000000000c00040004010000000000000c0005007f00000000000000cda913f73346223e9fe801bb1d22fa0db30635e680ff65ed2d14d50df845a26076713bb5230a2917df7e7134e61bb6a4634e41a8d9f7ae59906552c9c0b91a9c00000000000000000000000002000000"], 0x3}}, 0x800) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc9f44c4ed3aff93d}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r5, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffffb}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8080) 03:42:35 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x3, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x5ecfe7f1, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:35 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:35 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000c00)) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:35 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x10}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket(0x0, 0x0, 0xff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x803, 0xff) r3 = syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001000)) sendmmsg$unix(r4, 0x0, 0x0, 0x0) getpeername$unix(r3, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) bind$unix(0xffffffffffffffff, 0x0, 0x0) accept$inet(r0, &(0x7f0000000c00)={0x2, 0x0, @dev}, &(0x7f0000000c40)=0x10) sendfile(r2, r1, 0x0, 0x72439a6b) [ 2914.289629] audit: type=1400 audit(2000000555.890:12334): avc: denied { create } for pid=29094 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2914.563409] audit: type=1400 audit(2000000556.160:12335): avc: denied { write } for pid=29094 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:36 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r3 = getuid() r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) fchown(r2, r3, r5) exit_group(0x9) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:36 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000ac0)) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:36 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r4 = inotify_init() r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002180)={&(0x7f0000001680)={0x3, 0x38, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r9 = getpid() getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r10) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r12, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sendmmsg$unix(r2, &(0x7f0000002040)=[{&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000340)="d8c459a274df2547b31de2f5ff18e33d61a7e36b717f812be17a0bb0ac1cfa684e1726c1a1c566cdfbff70384a8744344724c89f27b50fa6fcda0ccf1870dff3b91e54e9948a1b16e21db8575d10b031cbf9bdd3a0c21d115e7c4278eba157e07f166edcb53fa5f37c78d83116a69e8711aa9e02505835a43e693a4baa8581ac823bc699d1d65467", 0x88}, {0xffffffffffffffff}, {&(0x7f0000000400)="58542a12a538", 0x6}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="d7f142f537dce627551c87fbcb520c47d37819611d3558be944b78726c14cf108ad57c619621a6c4b2cff5e90e11d032d403a32f48eaa5d6357d6af285b2bed742e39738d7bac372583c4b2cd1fb58f7b860424a227311a3b72e41e90527034101a758bb669587b82b9db3055390db8212c0a9473ba897f16aef6e6e4868e29c7862b60ca4f63d043ebc6a03171b27ac5b8b5cd381446e484bd93449a91fdde71d99bcb817c3c47f2a5c0f252092c5e3a185e25a93da4198e2ac379f2369acff2273538837b96b56a8a13fb481339baa2b", 0xd1}, {&(0x7f0000001540)="112c606775e9ed2f0932329e980ef4b61a570ee77e11485fb59908ee602e603441e2a2453bb0f87862666ce57efbb87493b5febfa679b01e9e0cd25a9f195f5a0ba86a27b275c3b5ba349e3117ba315282ebf7476e59f001fb4d654e7564a1d93f69f8bc9fcb40ae577c66e08c832b69c67bd68416d99bfe79ea5610db63d6d565b2221ac945c20d5d156cd41fb9cfea", 0x90}], 0x6, 0x0, 0x0, 0x800}, {&(0x7f0000001740)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001ec0)=[{&(0x7f00000017c0)="2251e92a3f0360fa1a16998062141005233cd938a3b51768258771fefe5e8a2774cfd897e0e11f81dcabc9806ec05bd51252d47b7b29d34fc8c34ae7f2044fdcaed56375f788b0de71e93dffc1a9fa0b337170941c509912784ada966a73ee18ba2d7b166d89299a2826a7ef17f31dddfe3dfccf556b55b0a5a8f25f5bb9b6e37619a985cda952ab8f8571f07515d17382140d4759360d708dcca44cd62be235c2fd9e5318", 0xa5}, {&(0x7f0000001880)="513c29e0510ec52b05a0d1280b61bb796b8bf4a2bca7a851d7bdb8c3cb22f7c8da2c10e084e4ca0dde07fa08ce2a344d7309bc2e011e590eb14cda783651418e5f6a5d3f4d381bed1fdce73e8b848b3cf9fd72af14bdb06de2b4bf01c515b86bfb3aeec4c4bc6fb090c8281ea8", 0x6d}, {&(0x7f0000001900)="acd9eddc63fa4de7bfe7ae3274eee1e8637d7e295f41a8ad9a867290c622ca25a9e0edca27c67bc26b990a00182e2e26dfa4455da89c4b8a8445c7ce6565f7f8465385b66278b69f027075af518654b12da0f73522c646705c2875c7f0a1d3d2b9060dc489d3ac35a1c3bd272b649175426b8c93e53d144abdb7b18c32044875153c859363c89e082dee6ab5e899ea8fa42876d00521bcf4622264133c05d6469f84dbc2ef45c4df8314874f3954c17013747a54d11ddce9337a03f374c49b5a2e46118edc3c595dc2dcc7a1817f49d25946635b48607864b61c738cedfa07fbc2fd9b75fa7e", 0xe6}, {&(0x7f0000001a00)="172355987b8686895f4ce814b697efd6da705ecd06c410e8621b7b48f025362b664c3ef743a96fd103e9c93f3acfb29ae202787836fb3ffecf529ee32e2b2cd644c57faa9608f887ce1f2e19fe8788bdba8f2acf761998e3cf655e9d10426edc6d7007d2c65f110fdfd4e8cb737dd9dcdba9196468ee79389f9ff694adedbb3f35c056a80f23b07d82867b84e5a9be87753f3950ffb459398d527f983519c21f212da915e2e3ba5f533c473d5ed4d17a9d82860681ab63da7ebfe043f3397621dd39d29d65a0fe6c4774f2b60c23c31d80e4dcbb8f046619", 0xd8}, {&(0x7f0000001b00)="0e88005203dd00d09cc6702ae0a03687a4adb0dc72d02421d78ff0d79efd9239872a963b6155708c332b675937ecddec83bfaa903eaa3f2eb653f5f2127e02098fbd076ead8e9e3c81c5ce9e3cf8429f6012fd043e266f1a692c901c798d31ebe7994881ff755a39cab9c45ba95c0fa0d6ff1b4b08bd83510436d201f6f97e33ecca6b6a3c7cbc544088e214d3d2942a1a0dc1d236048c18b2c8ad0ceafcbb38e2185a3dc08b0e1d08465152f7b7c9fe373c5a8841b2c587797235cd906b4dae42ffa81558927658687e2594fd7eeafa1be4bf9d08", 0xd5}, {&(0x7f0000001c00)="0f0cdb290de40a9ebff3fdd642ef4cd40d5a33d904d1b4e1a78a64969f96a52974703759047a0bfec56241c486daa70f414c0446d1a599ba1222d2be0ab56932d5e43c856765339a4f43b6ddcadc860cbac21f94ff15ce975b431ef85dc668ac92097107dd12aecd32489f2da5c6f9798378c308678dd2d4266ca73be9b08112001d1ffde44e861fdcb970bfe005c7f09ab3ff", 0x93}, {&(0x7f0000001cc0)="e9794c60fdff9e72014833d2b4875844d10a1e619ef4622c131bcc8bbc5c6143e292e983ba4245addb8a5a0498ca76ef4ddc1a3f43ed388343845b5b387f0fd4c6fb73b2cbf520c3048654048550224a55ac2c626931cd0731701d816bbc9bb09967acca8866d0e7bd45ce8117086363dd880b5d539c0b78eec15a6f1eea09e2cdd5123dcddab2eb09b13dfcd46b78a3c7488f9546a3cb5fed4d399820b5dc8bf68fe36f21c93ac514f70ff5a63ed4242432ef2ce5f2df375e7f15b89f9bd8a3ac71f92414307b4d638c8e6526f913bef6118b94b93fd59698051232", 0xdc}, {&(0x7f0000001dc0)="520565da550bbdae89a2b50887dedd0e3b62e05c27beaa18ea811ed97048ff9d1bd62acc8c95e28f04269f808a8a9ee8f51670a4e29b5f550efe35739a2bec74363155cac9f2dd9fa25bca6fc17d", 0x4e}, {&(0x7f0000001680)}, {&(0x7f0000001e40)="f1f267d0e3ea5d4f29a2d5c2b98eadee17438113a79eacb0ec78b10c41bfae95bc33ca6a7bfcce40195f2ead32ea2cac48ad71ef515836a6f08361b519e486311834c5e28c3cfeceb196ebdbf78df7", 0x4f}], 0xa, &(0x7f0000001f80)=[@rights={{0x28, 0x1, 0x1, [r2, r4, r5, r6, r7, r8]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [r3, r2]}}, @cred={{0x1c, 0x1, 0x2, {r9, r1, r10}}}, @rights={{0x20, 0x1, 0x1, [r11, r12, r13, r2]}}], 0x98, 0x4040004}], 0x2, 0x10) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r14, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000020c0)=ANY=[@ANYBLOB="140000001600010400000000000000000a000000e2f9b804243643a10c66913394d793ebfe50da4dac2785fdea297af1a3fac831b5603edd821ab9a001ac85dc9e2c422554d73f0f9da79da172bc9f77a5b352088ac1f58c5d7c8d25363faefe629750d3f0c0c01d63ba0bcc7a140b753e093e1737fa360040656f8ba83929f62ab3ae04affd"], 0x14}}, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r15, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r16 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r15) getsockopt$packet_buf(r16, 0x107, 0x1, &(0x7f00000000c0)=""/71, &(0x7f0000000140)=0x47) r17 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xd000800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r17, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x8, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8020000}, 0x640c8) rt_sigsuspend(&(0x7f0000000040), 0x8) preadv(r2, &(0x7f0000000500), 0x37d, 0x0) 03:42:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt(r3, 0x7f, 0x3, &(0x7f0000000000)=""/76, &(0x7f00000001c0)=0x4c) close(r2) 03:42:37 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:37 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000ac0)) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @multicast1}, &(0x7f0000000300)=0xc) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000a000000"], 0x14}}, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0x1268, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@generic="719b533b28d0685dc68e97906b707094b7f71bef0b9e1d0c3770dd4e78a70a3edd488666c556808e1ca762d53fbc3737730e101eec5c922c613b2c671dbc868cdd6ca7e0c3", @typed={0x8, 0x2e, @fd=r7}, @generic="8bbe8fb46e4b7eb14b45c7e4a8139badd086c8c7818a2929b3a323601a887cca349b9311e054eb2f3386f761d7021678569074be1a3bac985217cd286bc08dd8d200d25785e223d828926782536d36d324c3f61025f63402bf6737f7b17a14c9c622b7899241b72da403006bdf", @nested={0x10cc, 0x2a, [@typed={0xc, 0x81, @str='vxcan0\x00'}, @generic="3c5dc29fa5afd3ae7d39a5203f7d0046b716b9d4db17c017c193c1c9da7457e80eac1fe31f63b038e0d9ac2eee149eaf0c792b4a5b70392274cbbcfb90696482d8cf1bbff99809030282b2e86fc9f6378571b0b1d72ee3c2db89bac969914ee9b607a98f2b64bc3d90936cae225fdca8386577aa92f6ddd9e4c57de7589b92cae84f16a0ccdf41aa69f083b33d45035655db551960794970802faccc0890400180c450e5bf5a5ebd5b19e690", @generic="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", @typed={0x8, 0x40, @ipv4=@broadcast}, @typed={0x8, 0x24, @u32=0xfffffff8}]}, @generic="a28ce1175e512e537ff066c88d3eb8bd143ccc2247ccf1b3c353dc308e72d01936fe92d48a215c40d6eea471cdb4cdb5cdc7b9099a60ef27f1c46a0711f19ccf03513a0312b406aeba604c72e2f0c5111946a79eb48df963129c7cc2dfb14e8ee76ad4daf8deae53809dd5ab1a713cf9ed9b975bc00348d2cc1b9c042ce21de1d54a8d313d4c0505dd27a4976c870e409468574c0ce9", @typed={0x8, 0x0, @ipv4=@loopback}, @generic="ddd45f9c176e28d0fc147323c94ae7d0aef58789623a7ac5ba00a571e90ea7440434f18b9ddfb943222a8960877fdd14"]}, 0x1268}}, 0x0) r8 = dup2(r4, r6) ioctl$TIOCSSOFTCAR(r8, 0x541a, &(0x7f0000000140)=0x7ff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f00000000c0)) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000040)={@loopback, 0x0}, &(0x7f0000000080)=0x14) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000a40000)={&(0x7f0000b9e000)=@migrate={0x50, 0x21, 0x4, 0x0, 0x0, {{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9}, 0x6e6bb9}}, 0x50}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r14}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r14, @ANYBLOB="08000700ad1414aa"], 0x3}}, 0x8000) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000047c0)={'vxcan0\x00', r14}) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000004800)={'vxcan0\x00', r15}) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) sync_file_range(0xffffffffffffffff, 0x3, 0x0, 0x6) [ 2916.106016] selinux_nlmsg_perm: 4 callbacks suppressed [ 2916.106026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pig=29141 comm=syz-executor.1 [ 2916.174137] audit_printk_skb: 3 callbacks suppressed 03:42:37 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) [ 2916.174151] audit: type=1400 audit(2000000557.770:12337): avc: denied { create } for pid=29137 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:38 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2916.177054] audit: type=1400 audit(2000000557.780:12338): avc: denied { write } for pid=29137 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:38 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2916.466626] audit: type=1400 audit(2000000558.070:12339): avc: denied { read } for pid=29137 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:38 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:38 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2916.715339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pig=29147 comm=syz-executor.1 [ 2916.720883] audit: type=1400 audit(2000000558.320:12340): avc: denied { create } for pid=29137 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2916.722255] audit: type=1400 audit(2000000558.320:12341): avc: denied { write } for pid=29137 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:39 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2916.843322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29165 comm=syz-executor.4 [ 2916.844998] netlink: 4688 bytes leftover after parsing attributes in process `syz-executor.4'. 03:42:39 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) vmsplice(r1, &(0x7f0000000340)=[{&(0x7f0000000140)="362f085f98c40bd169afe4c998d593e569d0aa937a6e531c1c5538223e3c2a4cd2109b3c714d2aa22d12be9cce09417e8390236a5027169693d36ad2c7a4f89825dce617d11bf2ef4fa8b73f8d3a5065f42aa35ca27ed449097a35aa0a5875fe147f3c90c2099bea49d12e81911105a7f7479adece9ec81e0182d8c35290bb9951b2e359a1934727f31c0eaba855ee3e5adfdf4b9bd97df6647f79d617d98be7bf0e6c2c59044ecb4fc232eb83c0a702593ee90a61", 0xb5}, {&(0x7f00000002c0)="ee7381dce7346fdd35fb147c926b5a728b1086bb52a444a5ea75cc2dae1ba69efb342b607a8fc96677e9354da8d04ab0da4831955372914ff71044b083042f86f38d7458615081dafb5763", 0x4b}, {&(0x7f0000000200)="cb37447dbbf6cae3e3d432ac9ac5ca57cc83583072f6313260799f06cea7a78e688b9446d0a7", 0x26}], 0x3, 0x4) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) fremovexattr(r3, &(0x7f00000000c0)=@random={'osx.', '\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00'}) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r0, r4, 0x0, 0x800000000024) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) 03:42:39 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x260000, 0x0) dup2(r2, r2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="240000001a0007041dfffd946f6105000200000a1f000002002808000800040004000300", 0x24}], 0x1}, 0x0) r6 = dup2(r2, r4) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x16, 0x100000000401, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x104412a}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, r8, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xfffffbff, 0x81, 0x7ff]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0xc4}, 0x20004082) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)=ANY=[@ANYBLOB="170010006dbee2137a2164d050a571118f1f17043795cbd530cef17bee81286db4c2b378a9f4742d9b35d306e306e606d01dfc214bbae1a14e12746ebe48daa94f5e25ee9d66b890301c51d2119ff6e9a51296879d8f6b3c869ace8bbb65ce9bdf6f46ec7589e3aa7a76ae4679d650f228f2064066406db11b4163c83298c5d5604c183200bca198adc01db9c9f0e5f7790dd5cbbdff168f8b2fbb26bc5e775ecbbf5ed78a942f796de61f7d16ef9c877a52", @ANYBLOB="00000000000000001800120008000100707070000ccc459ef043f62aa03cfa1e01951ef5b395c761a1957b6dbaa0d54f19d9fd5f80ee494e62ba13da75dfd33ff5e33b4ac463fa3775632ac008da4f733c14f0fa4005c934f14d597f8eeddc368b4f4e6370d1cea81e833aa8fa94ac7d3f366995f8f0617cf2bd988c9ab4af2b9261bff8a122eeac75600f47ffe9728def7ba94eb3fda249527eb618386886740aac4abbd62247745854bae82de91f16e9d3b20f513fc012e667d9a439ecdf975caa7d21f46f9c5ccadeea4693348c5acb86c9af98261b1038727021541c441c22086953ad20d586c2caec", @ANYRES32=r6], 0x3}}, 0x0) r9 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r9, 0x0, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x804) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x1126a922bcf03925, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r9, 0x400, 0x870bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10008000}, 0x9dca1d1fbe803941) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x30, r9, 0x402, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xfffff2a3, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x80) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000005c0)=0x7fffffff, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r10 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r10, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r10, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) munlockall() bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e24, 0x7, @mcast2, 0x179}, 0x1c) close(r0) 03:42:39 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$P9_RGETATTR(r0, &(0x7f0000000340)={0xa0}, 0xa0) open(&(0x7f0000000000)='./bus\x00', 0x2c201, 0x28) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 03:42:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:39 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, &(0x7f0000000600)) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2917.998909] audit: type=1400 audit(2000000559.600:12342): avc: denied { create } for pid=29192 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:39 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2918.071040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29199 comm=syz-executor.2 03:42:39 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000ac0)) lstat(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2918.097084] audit: type=1400 audit(2000000559.700:12343): avc: denied { create } for pid=29192 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x198) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r3, 0x0, 0x320f) pipe(0x0) 03:42:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/netfilter\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x40000081) r1 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @dev}, 0x10) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x4, 0x9b, 0x1, 0x4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @local}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000380)=@rc={0x1f, {0x1, 0x80, 0x0, 0x3f, 0x8, 0x43}, 0x1}, 0x80) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0xb7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r7 = open(&(0x7f0000000200)='./file0\x00', 0x501800, 0x0) r8 = gettid() fcntl$setownex(r7, 0xf, &(0x7f0000000280)={0x0, r8}) syz_open_procfs(r8, &(0x7f00000002c0)='fdinfo\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r10 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) dup2(r12, r10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r13 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r13) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r13) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) r18 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$cgroup_pid(r18, &(0x7f0000000000)=r8, 0xc2b6f5f7) [ 2918.100001] audit: type=1400 audit(2000000559.700:12344): avc: denied { write } for pid=29192 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:40 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) pipe2(0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x394, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 2918.165561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29205 comm=syz-executor.2 03:42:40 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2918.455615] audit: type=1400 audit(2000000560.060:12345): avc: denied { read } for pid=29192 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2918.679161] audit: type=1400 audit(2000000560.280:12346): avc: denied { create } for pid=29192 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:40 executing program 4: syz_open_procfs(0x0, 0x0) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) timer_create(0x0, 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000200)=""/39, 0x27, 0x0) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) pipe(0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffdc1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000f6626d000000000600000000008b00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x8000000000001}) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_get$uid(0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000280)=[{{&(0x7f0000000840)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffe56}}], 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setresgid(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(r4, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) setresgid(0x0, 0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) 03:42:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000ac0)) lstat(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(r0, &(0x7f0000000300)={0x11, 0x1c}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000001000000000000000000000000000000065a06ddc0d17a0240042a1f47b9e6c7a911b6e95287e87d2be62c7df8fd39e16dfb54854179fffebde96aa5da1669b7839c8ef8dbfe9c0d2b884ee15ce422b97e74a9ef9806dbefa65294f826df006bdf33d30623ba7b517bfb3f0a883", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 2918.724830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29199 comm=syz-executor.2 [ 2918.746909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29223 comm=syz-executor.2 03:42:41 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0xffffffffffffffd2) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 03:42:41 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x90080, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000280)='bic\x00', 0x4) write(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x422000a7b, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:42:41 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x80808, &(0x7f00000003c0)=ANY=[@ANYBLOB="000200003d30303030303030303030303030303030303130303030302c6d6f64653d30303030303030303030303030303030303030303030322c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,smackfsdef=group_id,fowner>', @ANYRESDEC, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e542e6b14653d2c00"]) mount$fuseblk(&(0x7f0000000940)='/dev/loop0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='fuseblk\x00', 0x10008, &(0x7f0000000c40)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffeff}}, {@blksize={'blksize', 0x3d, 0x400}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'enc='}}, {@obj_role={'obj_role', 0x3d, ']user+$system-,'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>'}}, {@smackfshat={'smackfshat', 0x3d, 'crc32c\x00'}}, {@uid_lt={'uid<'}}, {@smackfsdef={'smackfsdef', 0x3d, 'oaep'}}]}}) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlockall() bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x1c}, 0x14) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') keyctl$setperm(0x5, 0x0, 0x0) add_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="48a8d017caa1dbbd04aa699c45055c7c45952a46f8230475f9ca0122a882fc22511d9f35d8a809d49e8cc30787a106fbbfa0d13a8dad9b23c74e", 0x3a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:42:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x34}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffdee, 0x10, &(0x7f0000000000), 0x9e}, 0x3e) sysinfo(&(0x7f0000000040)=""/36) [ 2919.903267] ================================================================== [ 2919.910684] BUG: KASAN: use-after-free in get_disk+0xc9/0xe0 [ 2919.916567] Read of size 8 at addr ffff8801cf3d1ea8 by task blkid/29250 [ 2919.923318] [ 2919.924945] CPU: 1 PID: 29250 Comm: blkid Not tainted 4.9.202+ #0 [ 2919.931166] ffff8801ad23f6e8 ffffffff81b55d2b 0000000000000000 ffffea00073cf400 [ 2919.939340] ffff8801cf3d1ea8 0000000000000008 ffffffff81b271e9 ffff8801ad23f720 [ 2919.947359] ffffffff8150c321 0000000000000000 ffff8801cf3d1ea8 ffff8801cf3d1ea8 [ 2919.955387] Call Trace: [ 2919.957962] [<000000002c31a233>] dump_stack+0xcb/0x130 [ 2919.963306] [<000000008f1a3eab>] ? get_disk+0xc9/0xe0 [ 2919.968567] [<0000000066f6b282>] print_address_description+0x6f/0x23a [ 2919.975215] [<000000008f1a3eab>] ? get_disk+0xc9/0xe0 [ 2919.980471] [<00000000e3de7057>] kasan_report.cold+0x8c/0x2ba [ 2919.986435] [<00000000a75828cd>] __asan_report_load8_noabort+0x14/0x20 [ 2919.993164] [<000000008f1a3eab>] get_disk+0xc9/0xe0 [ 2919.998245] [<00000000560f9168>] get_gendisk+0x171/0x2d0 [ 2920.003760] [<0000000033d09fc8>] __blkdev_get+0x356/0xeb0 [ 2920.009363] [<00000000ccb0f10d>] ? trace_hardirqs_on+0x10/0x10 [ 2920.015409] [<00000000e71d2dd5>] ? __blkdev_put+0x840/0x840 [ 2920.021187] [<000000008bc7d876>] blkdev_get+0x2e8/0x920 [ 2920.026618] [<000000004c1ed657>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2920.033349] [<000000000ff23bc3>] ? bd_may_claim+0xd0/0xd0 [ 2920.039212] [<00000000ebe0966b>] ? bd_acquire+0x26/0x250 [ 2920.044727] [<00000000f83d5917>] ? bd_acquire+0x88/0x250 [ 2920.050684] [<000000009be6955b>] ? do_raw_spin_unlock+0x142/0x220 [ 2920.056982] [<00000000d0de3062>] ? _raw_spin_unlock+0x2d/0x50 [ 2920.062954] [<000000000c4a96fc>] blkdev_open+0x1aa/0x250 [ 2920.068753] [<00000000f991e036>] do_dentry_open+0x422/0xd20 [ 2920.074545] [<00000000e56bb38e>] ? blkdev_get_by_dev+0x80/0x80 [ 2920.080583] [<000000000e5c6b48>] vfs_open+0x105/0x230 [ 2920.085845] [<000000007e4e9c14>] ? may_open.isra.0+0x139/0x290 [ 2920.091881] [<00000000895c6694>] path_openat+0xbf5/0x2f60 [ 2920.097533] [<00000000c65ae96c>] ? path_mountpoint+0x6d0/0x6d0 [ 2920.103577] [<000000003925a9d1>] do_filp_open+0x1a1/0x280 [ 2920.109203] [<000000008bbb329a>] ? may_open_dev+0xe0/0xe0 [ 2920.114807] [<000000009be6955b>] ? do_raw_spin_unlock+0x142/0x220 [ 2920.121130] [<00000000d0de3062>] ? _raw_spin_unlock+0x2d/0x50 [ 2920.127082] [<00000000ce21a306>] do_sys_open+0x2f0/0x610 [ 2920.132615] [<000000000b19b67c>] ? filp_open+0x70/0x70 [ 2920.137957] [<000000007ad107e3>] ? __do_page_fault+0x545/0xa60 [ 2920.143993] [<00000000d75e9e19>] SyS_open+0x2d/0x40 [ 2920.149073] [<000000008e2a0117>] ? do_sys_open+0x610/0x610 [ 2920.154764] [<000000004e75ae09>] do_syscall_64+0x1ad/0x5c0 [ 2920.160456] [<000000008e9f1d3b>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2920.167532] [ 2920.169138] Allocated by task 28936: [ 2920.172920] save_stack_trace+0x16/0x20 [ 2920.176872] kasan_kmalloc.part.0+0x62/0xf0 [ 2920.181168] kasan_kmalloc+0xb7/0xd0 [ 2920.184860] kmem_cache_alloc_trace+0x115/0x2d0 [ 2920.189521] alloc_disk_node+0x50/0x3c0 [ 2920.193919] alloc_disk+0x1b/0x20 [ 2920.197364] loop_add+0x37e/0x7d0 [ 2920.200808] loop_probe+0x154/0x180 [ 2920.204423] kobj_lookup+0x221/0x410 [ 2920.208129] get_gendisk+0x3c/0x2d0 [ 2920.211733] __blkdev_get+0x356/0xeb0 [ 2920.215523] blkdev_get+0x2e8/0x920 [ 2920.219213] blkdev_open+0x1aa/0x250 [ 2920.222915] do_dentry_open+0x422/0xd20 [ 2920.227054] vfs_open+0x105/0x230 [ 2920.230484] path_openat+0xbf5/0x2f60 [ 2920.234278] do_filp_open+0x1a1/0x280 [ 2920.238072] do_sys_open+0x2f0/0x610 [ 2920.241761] SyS_open+0x2d/0x40 [ 2920.245019] do_syscall_64+0x1ad/0x5c0 [ 2920.248888] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2920.253963] [ 2920.255576] Freed by task 20930: [ 2920.258923] save_stack_trace+0x16/0x20 [ 2920.262887] kasan_slab_free+0xb0/0x190 [ 2920.266838] kfree+0xfc/0x310 [ 2920.269931] disk_release+0x255/0x330 [ 2920.273709] device_release+0x7d/0x220 [ 2920.277588] kobject_put+0x150/0x260 [ 2920.281291] put_disk+0x23/0x30 [ 2920.284560] __blkdev_get+0x581/0xeb0 [ 2920.288350] blkdev_get+0x2e8/0x920 [ 2920.291967] blkdev_open+0x1aa/0x250 [ 2920.295669] do_dentry_open+0x422/0xd20 [ 2920.299715] vfs_open+0x105/0x230 [ 2920.303691] path_openat+0xbf5/0x2f60 [ 2920.307484] do_filp_open+0x1a1/0x280 [ 2920.311260] do_sys_open+0x2f0/0x610 [ 2920.314963] SyS_open+0x2d/0x40 [ 2920.318220] do_syscall_64+0x1ad/0x5c0 [ 2920.322086] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2920.327182] [ 2920.328801] The buggy address belongs to the object at ffff8801cf3d1980 [ 2920.328801] which belongs to the cache kmalloc-2048 of size 2048 [ 2920.341632] The buggy address is located 1320 bytes inside of [ 2920.341632] 2048-byte region [ffff8801cf3d1980, ffff8801cf3d2180) [ 2920.353761] The buggy address belongs to the page: [ 2920.358771] page:ffffea00073cf400 count:1 mapcount:0 mapping: (null) index:0xffff8801cf3d0000 compound_mapcount: 0 [ 2920.370321] flags: 0x4000000000010200(slab|head) [ 2920.375142] page dumped because: kasan: bad access detected [ 2920.381261] [ 2920.382876] Memory state around the buggy address: [ 2920.387785] ffff8801cf3d1d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2920.395137] ffff8801cf3d1e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2920.402475] >ffff8801cf3d1e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2920.409813] ^ [ 2920.414460] ffff8801cf3d1f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2920.421871] ffff8801cf3d1f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2920.429217] ================================================================== [ 2920.436745] Disabling lock debugging due to kernel taint [ 2920.442248] Kernel panic - not syncing: panic_on_warn set ... [ 2920.442248] [ 2920.449601] CPU: 1 PID: 29250 Comm: blkid Tainted: G B 4.9.202+ #0 [ 2920.457253] ffff8801ad23f628 ffffffff81b55d2b ffff8801ad23f700 ffffffff82e3f768 [ 2920.465322] 00000000ffffffff 0000000000000001 ffffffff81b271e9 ffff8801ad23f708 [ 2920.473357] ffffffff813fef21 0000000041b58ab3 ffffffff82e316f3 ffffffff813fed41 [ 2920.481400] Call Trace: [ 2920.483973] [<000000002c31a233>] dump_stack+0xcb/0x130 [ 2920.490455] [<000000008f1a3eab>] ? get_disk+0xc9/0xe0 [ 2920.495935] [<00000000df5d6c70>] panic+0x1e0/0x3c4 [ 2920.500961] [<000000003946e569>] ? add_taint.cold+0x16/0x16 [ 2920.506747] [<0000000075eeba87>] kasan_end_report+0x47/0x4f [ 2920.512528] [<000000007c2f14e7>] kasan_report.cold+0xa9/0x2ba [ 2920.518479] [<00000000a75828cd>] __asan_report_load8_noabort+0x14/0x20 [ 2920.525213] [<000000008f1a3eab>] get_disk+0xc9/0xe0 [ 2920.530387] [<00000000560f9168>] get_gendisk+0x171/0x2d0 [ 2920.535993] [<0000000033d09fc8>] __blkdev_get+0x356/0xeb0 [ 2920.542219] [<00000000ccb0f10d>] ? trace_hardirqs_on+0x10/0x10 [ 2920.548531] [<00000000e71d2dd5>] ? __blkdev_put+0x840/0x840 [ 2920.554479] [<000000008bc7d876>] blkdev_get+0x2e8/0x920 [ 2920.559921] [<000000004c1ed657>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2920.566670] [<000000000ff23bc3>] ? bd_may_claim+0xd0/0xd0 [ 2920.572278] [<00000000ebe0966b>] ? bd_acquire+0x26/0x250 [ 2920.577968] [<00000000f83d5917>] ? bd_acquire+0x88/0x250 [ 2920.583484] [<000000009be6955b>] ? do_raw_spin_unlock+0x142/0x220 [ 2920.589783] [<00000000d0de3062>] ? _raw_spin_unlock+0x2d/0x50 [ 2920.595746] [<000000000c4a96fc>] blkdev_open+0x1aa/0x250 [ 2920.601456] [<00000000f991e036>] do_dentry_open+0x422/0xd20 [ 2920.607343] [<00000000e56bb38e>] ? blkdev_get_by_dev+0x80/0x80 [ 2920.613383] [<000000000e5c6b48>] vfs_open+0x105/0x230 [ 2920.618644] [<000000007e4e9c14>] ? may_open.isra.0+0x139/0x290 [ 2920.624682] [<00000000895c6694>] path_openat+0xbf5/0x2f60 [ 2920.630301] [<00000000c65ae96c>] ? path_mountpoint+0x6d0/0x6d0 [ 2920.636344] [<000000003925a9d1>] do_filp_open+0x1a1/0x280 [ 2920.641944] [<000000008bbb329a>] ? may_open_dev+0xe0/0xe0 [ 2920.647563] [<000000009be6955b>] ? do_raw_spin_unlock+0x142/0x220 [ 2920.653861] [<00000000d0de3062>] ? _raw_spin_unlock+0x2d/0x50 [ 2920.659811] [<00000000ce21a306>] do_sys_open+0x2f0/0x610 [ 2920.665341] [<000000000b19b67c>] ? filp_open+0x70/0x70 [ 2920.670723] [<000000007ad107e3>] ? __do_page_fault+0x545/0xa60 [ 2920.676775] [<00000000d75e9e19>] SyS_open+0x2d/0x40 [ 2920.681870] [<000000008e2a0117>] ? do_sys_open+0x610/0x610 [ 2920.687567] [<000000004e75ae09>] do_syscall_64+0x1ad/0x5c0 [ 2920.693268] [<000000008e9f1d3b>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2920.700813] Kernel Offset: disabled [ 2920.704426] Rebooting in 86400 seconds..