LR_FD(0xffffffffffffffff, 0x4c01) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, 0xfffffd52) flistxattr(r0, &(0x7f0000000800)=""/121, 0x79) writev(0xffffffffffffffff, 0x0, 0x0) 00:51:47 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000240)={r1, 0x1, 0xacaf, 0x6, 0x2, 0x3, 0x2}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000001040)="c3", 0x1, 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x101, 0x0) 00:51:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:47 executing program 5: r0 = accept4$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80000) r1 = dup(r0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000003c0)={0x80000000, 0x200, 0xb3dc, 0x7000, 0x1, 0x7, 0x1000, 0x667, 0x8000, 0x8001}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x120, r2, 0x208, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5a01}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc78}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x12a}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x187}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x14}, 0x11) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000540)) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='umask=0000000000002!477777777,\x00']) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000400)=""/145, &(0x7f0000000500)=0x91) 00:51:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe00}, [{}]}, 0x58) 00:51:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x58) 00:51:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000010000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:51:48 executing program 0: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x20000) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x1) [ 2593.200620] net_ratelimit: 20 callbacks suppressed [ 2593.200628] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.210852] protocol 88fb is buggy, dev hsr_slave_1 00:51:48 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/195) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x115b) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/26) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) move_pages(0x0, 0x3, &(0x7f0000000080)=[&(0x7f0000000000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f00000002c0)={0x2, "9b89d0068f04c49abed667125db16e6ecd2ca2c4ddaf982878e87887dfae9a2e", 0x3, 0x101, 0x8, 0x40424, 0x2}) 00:51:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x183) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xfffffffffffffffe, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x1, 0x7, 0x3, 0x7}, 0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x4000002, 0x1, [0x0]}, 0xa) 00:51:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1100}, [{}]}, 0x58) 00:51:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}]}, 0x58) 00:51:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="186af00000000000000000000000000061172800000000009500e0ffffff0000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) 00:51:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2593.760619] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.765804] protocol 88fb is buggy, dev hsr_slave_1 00:51:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2100}, [{}]}, 0x58) 00:51:49 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20, 0x88000) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000040), 0x4) r1 = msgget$private(0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x24) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r3, 0xfffffffffffffff7, 0x8000}, 0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r2, 0x56}, 0x8) msgrcv(r1, &(0x7f0000000180)={0x0, ""/63}, 0x47, 0x3, 0x2000) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e23, @rand_addr=0x9}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}, 0x320, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)='erspan0\x00', 0x0, 0x200, 0x4}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000002c0)={{0x3, 0x7fff}, 0x0, 0xffffffff, 0xe000, {0x8, 0xfff}, 0x3, 0x100000001}) r6 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video0\x00', 0x2, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000003c0)={r5, 0x2}, 0x8) ioctl$UFFDIO_WAKE(r7, 0x8010aa02, &(0x7f0000000400)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r8 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x40000) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000480)=0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000004c0)={r4, 0xfffffffffffffff8, 0xe5, "83ec587c9d6208b95a546909accd68d4d6ae9a04fad0e6a226b97324b048f61340ac14f296d0855da5fd22cda707e8551e1e6f833d972b2be6347b4926bdc6d231da259f595777f6f024c9ab40a99c612f6b03ce95e32d3be6a74bf1d34e67e8164a5f9ff2072d970d378076aa1d32b74a24249c4a55f977d53c02a74fa5eb54c0ce0d8f7604a3b0ce7642e2fd1be7b6e60f8d1e7a6832e1abc4cfc2e69f29a61b9bea2b21ef6594e8a60651e9dfd21fa26e59f1d9ef0f77a149e310c39f7d42be2b45bba7b098aaea9e6a1b4a8bdcc0cd90dede68d13b745e457294d33ad9af9bddca80ed"}, 0xed) write$P9_ROPEN(r0, &(0x7f00000005c0)={0x18, 0x71, 0x2, {{0x84, 0x2}, 0xcec}}, 0x18) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000600)={0x18000, 0x4, 0x5, 0x1b, 0x14, 0x800, 0x1, 0x0, 0x3, 0x40, 0x1, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000640)=0xf) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000680)=0x14) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000006c0)=0x2, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000700)={'filter\x00', 0x82, "7c59dee0ff22782b6f57e73b4db3e5514155dd1603b952e5106eed93784a99d4be04dc542e0ef503fc7d1d3c516ac24b07d6b54bd8ddfc03d9441faadfaccb06e97e736b930967a54b95deff02e7c014fb1898448e21cc2d82dd414c12c128de8def680ecfe599afcc4a9b18289a3e1970d0acdf2167351fa2f15cba18fbe833b881"}, &(0x7f00000007c0)=0xa6) setxattr$security_evm(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='security.evm\x00', &(0x7f0000000880)=@v2={0x7, 0x1, 0xa, 0x3, 0x98, "6b4e98e2b2b9df16275d95e5840c983a5e58e6ee6269f247217c3d9f69c4d2e212a8e81e04ee1ae632e96dba5ae51d24bbefdc22905bdb17464bc86187c471bbf11ed911c69ff956e01ddf33d6958a438034498aca322af45682d2aa096b19a4b4fbc8594ac2077e9db3577e7e39579a6f1c9420927cf7504680ac58acabe7e68dcbb7b9de67c6b281eb08647c46353c8c1133fd93e66f9c"}, 0xa2, 0x3) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000940)={0x5, 0x3ff, 0x10001}) ioctl$VIDIOC_DBG_G_REGISTER(r6, 0xc0385650, &(0x7f0000000980)={{0x1, @name="d9942fbe4b2e987251ec01076d5ebcde2a9db81177adc1ecd46d7db8792af1e3"}, 0x8, 0x2, 0x9}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000009c0)={r3, 0x6, 0x5}, 0x8) syz_genetlink_get_family_id$team(&(0x7f0000000a00)='team\x00') ioctl$TCXONC(r8, 0x540a, 0x2) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10002100}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x38, r9, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) [ 2593.840608] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.845841] protocol 88fb is buggy, dev hsr_slave_1 00:51:49 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0xffffffff, {{0xa, 0x4e20, 0x6, @local, 0x2}}}, 0x1015d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x3, 0x3, 0x7, 0x1, 0x800}, 0x14) r1 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r1, 0x29, 0xcf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r3, 0x3ff}, &(0x7f0000000280)=0x8) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) 00:51:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf401}]}, 0x58) 00:51:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2594.240582] protocol 88fb is buggy, dev hsr_slave_0 [ 2594.246038] protocol 88fb is buggy, dev hsr_slave_1 [ 2595.041880] protocol 88fb is buggy, dev hsr_slave_0 [ 2595.050552] protocol 88fb is buggy, dev hsr_slave_1 00:51:50 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x180) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7f, 0x200) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x800455d1, &(0x7f0000001000)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x9, 0x800}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x61, 0x81}, &(0x7f0000000280)=0x8) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x1, 0x404000) 00:51:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x20480}]}, 0x58) 00:51:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000300)=0xfffffffffffffffe, 0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@nfs_export_on='nfs_export=on'}, {@lowerdir={'lowerdir', 0x3d, './file1'}}]}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x80000000, 0x6, 0x4, 0x521, 0xf1a, 0x1, 0xfffffffffffffbff, 0x5, r2}, 0x20) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000100)={0x0, 0x7fffffff, 0x0, 0x0}) 00:51:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2f00}, [{}]}, 0x58) 00:51:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0xc00, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000240)={[], 0x1, 0x7, 0x7f6, 0x8, 0x81, r1}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000000c0)) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100100f80ecdb4cb9047ec8650407000000000000fb120011010e000500250019a9060015000000", 0x2e}], 0x1}, 0x0) 00:51:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3200}, [{}]}, 0x58) 00:51:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2595.549253] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2595.774479] kauditd_printk_skb: 161 callbacks suppressed [ 2595.774504] audit: type=1400 audit(3110.989:77351): avc: denied { map } for pid=6369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}]}, 0x58) [ 2595.955416] audit: type=1400 audit(3110.989:77352): avc: denied { map } for pid=6369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:51 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:51:51 executing program 0: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowe2dir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') rmdir(&(0x7f0000000000)='./file0/file0\x00') [ 2596.011626] audit: type=1400 audit(3111.139:77353): avc: denied { map } for pid=6393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:51 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x200, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000200)={0x1, r1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000dbfffc)=0x3, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) bind$inet6(r2, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r2, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000c9effc), 0x4) sendto$inet6(r2, &(0x7f0000ab4f8e)="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", 0x54f, 0x0, 0x0, 0x0) r3 = dup(r2) write$eventfd(r3, &(0x7f0000571ff8), 0x8) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000180)={0x1207, 0xcf}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000080)={0x9, 0x0, 'client0\x00', 0x6, "bd49de1d052d2276", "87bd5f57e183b10a2c5802e7e198158e2a0e2ef551afb59bf861193e671df4d1", 0x6, 0x7167d2db}) sendmmsg$alg(r3, &(0x7f00004fef90)=[{0x0, 0x0, &(0x7f00000b4000)=[{&(0x7f000050ef3f)='l', 0x1}], 0x1}], 0x1, 0x0) write$eventfd(r3, &(0x7f0000000000), 0x8) dup(r3) 00:51:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3300}, [{}]}, 0x58) [ 2596.229420] audit: type=1400 audit(3111.439:77354): avc: denied { map } for pid=6439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2596.339291] audit: type=1400 audit(3111.469:77355): avc: denied { map } for pid=6439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2596.372467] input: syz1 as /devices/virtual/input/input50 00:51:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2596.587314] audit: type=1400 audit(3111.469:77356): avc: denied { map } for pid=6439 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2596.844122] audit: type=1400 audit(3111.499:77357): avc: denied { map } for pid=6439 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.019612] audit: type=1400 audit(3111.509:77358): avc: denied { map } for pid=6439 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}]}, 0x58) 00:51:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4603}, [{}]}, 0x58) 00:51:52 executing program 0: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') [ 2597.185158] audit: type=1400 audit(3111.519:77360): avc: denied { map } for pid=6444 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2597.401934] audit: type=1400 audit(3111.519:77361): avc: denied { map } for pid=6444 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="9fb426a514a3dd3d"]) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x200000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000180)={0x10}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:51:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000500000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:51:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4703}, [{}]}, 0x58) 00:51:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b}]}, 0x58) 00:51:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:53 executing program 0: r0 = socket(0x8, 0x10000000000804, 0x0) write(r0, &(0x7f0000000000)="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", 0xfc) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) r2 = getuid() mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x10000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e20,rq=0x0000000000000008,rq=0xd000000000000000,rq=0x0000000000008f32,sq=0x00000000000000d0,rq=0x000000000000149b,rq=0x0000000000000009,sq=0x0000000000000003,timeout=0x000000000000ffff,rq=0x0000000000000008,appraise,rootcontext=staff_u,dont_measure,fowner<', @ANYRESDEC=r1, @ANYBLOB=',s\t\x00ckfsdef=ppp0,obj_type=/dev/mixer\x00,fowner=', @ANYRESDEC=r2, @ANYBLOB=',context=sysadm_u,\x00']) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0xa000, 0x0) ioctl$IMADDTIMER(r3, 0x80044940, &(0x7f0000000140)=0x14) personality(0x800000f) [ 2598.400602] net_ratelimit: 20 callbacks suppressed [ 2598.400611] protocol 88fb is buggy, dev hsr_slave_0 [ 2598.410768] protocol 88fb is buggy, dev hsr_slave_1 00:51:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000014000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001e000103000000000000000000002afe"], 0x14}}, 0x0) 00:51:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x58) 00:51:53 executing program 5: socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x1) close(r0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)}, 0x8000) 00:51:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6000}, [{}]}, 0x58) 00:51:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="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"}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 00:51:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6c00}, [{}]}, 0x58) 00:51:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x58) [ 2599.200623] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.205808] protocol 88fb is buggy, dev hsr_slave_1 [ 2599.211148] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.216275] protocol 88fb is buggy, dev hsr_slave_1 00:51:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) 00:51:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2599.440670] protocol 88fb is buggy, dev hsr_slave_0 [ 2599.445846] protocol 88fb is buggy, dev hsr_slave_1 00:51:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe000}, [{}]}, 0x58) 00:51:54 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r1, r2) r3 = memfd_create(&(0x7f0000000200)='#vmem1\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000080)=0xc) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x800, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x16, r4, 0x1, 0x8, 0x6, @broadcast}, 0x14) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000040)) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x2, 0x2) 00:51:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000180)={0x79}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000200)='\xdf', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r4, 0x400, 0x1) fcntl$setown(r4, 0x8, 0x0) execveat(r4, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r5, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) connect(r6, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) connect(r3, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r7 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r7, 0x101000000000013) listen(r5, 0x86) 00:51:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000500000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:51:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x58) [ 2600.000669] protocol 88fb is buggy, dev hsr_slave_0 [ 2600.005845] protocol 88fb is buggy, dev hsr_slave_1 00:51:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM_MAP(0x23, 0xd, &(0x7f0000000100)={&(0x7f0000fef000/0xf000)=nil, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fef000/0x10000)=nil, 0x0}, 0xffffffffffffff56) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x401, 0x8000) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f00000000c0)) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, 0x0) 00:51:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x34000}, [{}]}, 0x58) 00:51:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000004603000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:51:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x241, 0x0) setsockopt$inet_buf(r1, 0x0, 0x25, &(0x7f0000000280)="3ac2f64d38772bcbca7e2b1a734ddbf6ee082d5febf0659dcdee262090cacde587a1c008a18b481cccd392e2aed4076a06a2fb89f71861dfca88d37341074e7c0ccdb5db3e076758054d9fd754e8883d9df035b9bf2efcd8cf00383ce5286517cb8e58f3ae50dd0d29be3c0f2484ebb3516fe9f9cf70f4e04274b38ac1098228bc1d713a0ea402652a858ade5ab002de", 0x90) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x200200) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000180)) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f00000000c0)='-\'O\'mime_type\'trustedwlan0#\'.em0cgroup\x00', 0x27) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:51:55 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="b52b05691c2d2b205190627489f48fc58a9e07937f47"], 0xc) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x500) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000100)=""/90) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:51:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400300}, [{}]}, 0x58) 00:51:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x58) [ 2600.818722] kauditd_printk_skb: 171 callbacks suppressed [ 2600.818738] audit: type=1400 audit(3116.029:77532): avc: denied { map } for pid=8058 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:56 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYRES64=r0], 0xfffffffffffffd07) 00:51:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000004703000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2601.004603] audit: type=1400 audit(3116.069:77533): avc: denied { map } for pid=8058 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.156717] audit: type=1400 audit(3116.089:77534): avc: denied { map } for pid=8058 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.326625] audit: type=1400 audit(3116.109:77535): avc: denied { map } for pid=8058 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6b6b6b}, [{}]}, 0x58) 00:51:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600)="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", 0xa00) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1ffe0) 00:51:56 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x88040, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x20000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0xa00, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0x1, 0x4) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000140)={0x40001003a1}) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000380)=0x6) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000340)={0x3, 0x1, [0x1, 0x4, 0x6, 0x6, 0x81, 0x3800000000000, 0x10000, 0x4]}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000400)=0x1e) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x713, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x3b, &(0x7f0000000240)="75431fd0ff3b6bba1d1f536d48aa7c27814739180ac6c3ffea2aa4c8a01f30d95020b2e799542d70661b8867c557246875dfa6fa9bf64c2fd378f286105dd82789e22e2b1ce23ac3ad3361fc31a01e598252ceb7f6ab5029316f2188db306f322ee6c57d5ec44dffa1466324adb79275d1747dc0848a8b4fd69fba8542d91a6d67", 0x324) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0x7fffffff, 0x8, 0x400, 0x8001, 0x1000, 0x8, 0x6}, &(0x7f0000000200)=0x20) [ 2601.492019] audit: type=1400 audit(3116.119:77536): avc: denied { map } for pid=8058 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2601.672233] audit: type=1400 audit(3116.189:77537): avc: denied { map } for pid=8098 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x58) [ 2601.832820] audit: type=1400 audit(3116.189:77538): avc: denied { map } for pid=8098 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000006000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2601.979946] audit: type=1400 audit(3116.219:77539): avc: denied { map } for pid=8098 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2602.009891] usb usb5: usbfs: process 8348 (syz-executor.0) did not claim interface 0 before use 00:51:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1000000}, [{}]}, 0x58) [ 2602.091800] audit: type=1400 audit(3116.219:77540): avc: denied { map } for pid=8098 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2602.213710] audit: type=1400 audit(3116.269:77541): avc: denied { map } for pid=8104 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:51:57 executing program 2: syz_execute_func(&(0x7f0000000180)="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") mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 00:51:57 executing program 0: pause() syz_execute_func(0x0) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000001480)="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") 00:51:57 executing program 5: futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000840)="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") 00:51:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2000000}, [{}]}, 0x58) 00:51:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x58) 00:51:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4000000}, [{}]}, 0x58) 00:51:58 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000180)=[0x3, 0xc410]) r2 = memfd_create(&(0x7f00000000c0)=',!\x00', 0x0) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000240)="2d9c46857fc92eb88736cf699891896482d15a1b681f966855742ce22d7b4fcf6ebdc2ecabb2960609474eccd27a6541a7496459c3e1c407d6b70b3d72d628e841372fafdb53a5ede5665ba2f45d978fa1499e71005ab6766705d3330d80633c4bf964defb5354fd2b0e0645fe9cc8eac5") write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x4000, 0xc0) sendfile(r1, r2, 0x0, 0x80004) r4 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f0000000140)={'syz'}, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r4, 0x3, 0x6, 0x0) 00:51:58 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() write$P9_RWRITE(0xffffffffffffffff, 0x0, 0xffffffa5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RLERRORu(r0, 0x0, 0xfffffe5a) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) lsetxattr(0x0, 0x0, 0x0, 0x0, 0x0) getrandom(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0xfffffffffffffed2) tkill(r1, 0x1000000000016) 00:51:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x58) [ 2603.600632] net_ratelimit: 20 callbacks suppressed [ 2603.600642] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.605711] protocol 88fb is buggy, dev hsr_slave_1 [ 2604.160633] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.165927] protocol 88fb is buggy, dev hsr_slave_1 [ 2604.240608] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.245790] protocol 88fb is buggy, dev hsr_slave_1 00:51:59 executing program 2: 00:51:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x58) 00:51:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5000000}, [{}]}, 0x58) 00:51:59 executing program 5: pause() syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e1a5f97300661f3a8e16649c675100617b2ee32222414ad04b00c442019dcc0510d46f") r0 = getpgid(0x0) syz_open_procfs(r0, 0x0) syz_execute_func(&(0x7f0000001080)="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") 00:51:59 executing program 0: pause() syz_execute_func(&(0x7f0000000200)="3666440f50f564ff0941c3c4e1a5f97300661f3a8e16649c675100617b2ee32222414ad04b00c442019dcc0510d46f") syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000640)="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") epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 00:51:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6000000}, [{}]}, 0x58) 00:51:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:51:59 executing program 5: [ 2604.640601] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.645777] protocol 88fb is buggy, dev hsr_slave_1 00:52:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}]}, 0x58) 00:52:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x7000000}, [{}]}, 0x58) 00:52:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:00 executing program 2: 00:52:00 executing program 0: 00:52:00 executing program 5: 00:52:00 executing program 0: 00:52:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2605.440669] protocol 88fb is buggy, dev hsr_slave_0 [ 2605.445877] protocol 88fb is buggy, dev hsr_slave_1 00:52:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa000000}, [{}]}, 0x58) 00:52:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0) 00:52:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}]}, 0x58) [ 2605.864206] kauditd_printk_skb: 169 callbacks suppressed [ 2605.864221] audit: type=1400 audit(3121.076:77711): avc: denied { map } for pid=9930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getrandom(&(0x7f0000000140)=""/12, 0xc, 0x2) 00:52:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2605.997640] audit: type=1400 audit(3121.106:77712): avc: denied { map } for pid=9897 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2606.148465] audit: type=1400 audit(3121.116:77713): avc: denied { map } for pid=9930 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 2: shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000000c0)=""/106) 00:52:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe000000}, [{}]}, 0x58) [ 2606.289742] audit: type=1400 audit(3121.126:77714): avc: denied { map } for pid=9933 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2606.340158] audit: type=1400 audit(3121.156:77715): avc: denied { map } for pid=9933 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 2606.403384] audit: type=1400 audit(3121.176:77716): avc: denied { map } for pid=9933 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2606.574872] audit: type=1400 audit(3121.316:77717): avc: denied { map } for pid=9940 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc008551c, 0x0) 00:52:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}]}, 0x58) [ 2606.690937] audit: type=1400 audit(3121.336:77718): avc: denied { map } for pid=9941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x11000000}, [{}]}, 0x58) [ 2606.890869] audit: type=1400 audit(3121.346:77719): avc: denied { map } for pid=9941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2607.020786] audit: type=1400 audit(3121.356:77720): avc: denied { map } for pid=9941 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4040ae9e, 0x0) 00:52:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x21000000}, [{}]}, 0x58) 00:52:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 00:52:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00}]}, 0x58) 00:52:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2f000000}, [{}]}, 0x58) 00:52:03 executing program 5: r0 = socket(0x7, 0x804, 0x5) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xffffffff, &(0x7f0000000100)=0x2) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x805, 0x100) gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x107fe) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"]}) r4 = accept(r2, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r3, &(0x7f0000000380)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000300)={0x0, 0x2710}, 0x40) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) socket$inet6(0xa, 0x100008, 0x8) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 00:52:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:03 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@hat={'permhat ', 0x0, 0x5e, ['(-system-ppp1\x00']}, 0x29) 00:52:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}]}, 0x58) 00:52:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x32000000}, [{}]}, 0x58) [ 2608.800593] net_ratelimit: 20 callbacks suppressed [ 2608.800603] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.810971] protocol 88fb is buggy, dev hsr_slave_1 00:52:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/166, 0xa6}], 0x1) 00:52:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00>%x\x90\x1b\\%j\\!:\xe7\xf6\xf7\xbd`r;\xd6F\x00v\xae$\x19\xffb\xc3\xa57\xc3\x90\x86\xdb\xe3\x1d\x98$\x8d\xc1P\xbf\t\\\x8eW\x16\x84!\xa0\xae\x9e\x18\x9f\xd6?e\xa9\xc5\xc2B\x0e\xfa\xa1\xd2\x87i\xcf\xa7\xe0\x9ajF\x80\xda\xac3\xe3\xe9R\xf8\xb0^1\xf6+\x13\xf2\x1e\x9a\xdf\xdd\xaf\xf7\xe8\xa9\xb6\xf3\xe7!\xcd\xe8\x02J\xf1\xf3\xa8\xc4\xdbX\xebLC\x06\xab\xdf`\xdb>\xb4\xd2\x99,X Mhp\xdd \xb5\x18f\xa1~,\x1e[\xe3\x92\xef\xe8Q\r\xbe\x05B\xcd\x8f\x11\xc1EkQZ\xf0\xed[F\x85\x9b\xdbM \x9e\xa3\x1fX\x806Q\x19]\xc4r\xc8t9\x90\xc3\xe5A\x1cb\x99\xd5\b\xe0\x1d\xa1\xce\x88\x82]\xfb\xf6o\xbfv\xa8\xdc\x81\xe1\x05d\x00\x00\x00\x00\x00\x00\xe3\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\x9cx\xb3?\xe4@\xb6.j\x89+\xd7~\xe7=rn\xdb\xe8\x1f\x9b\x9f\xb4\xa3>.[[\x05[o*\xfd5\xf4E\x01\x14\xc9D\xd2\a~?\xc0Y\x8f\x19+\x97\x83I\x7f\x90\xb8d\xe1>W~TZ\x0f\x96+\xcf\xcc\x8fr\xa9\xfc\xe5\x10\xf77\xbb\x96\xc7\r1\x14\xd7\x10+\x83\xfc9\a\xcfu\xff\xbeN\xdec\x1bg\xab\x88\xf6s?\x8d\x8e\xb0\xe0\xfe\x97=\xdc\x04S/\xdai\xcf\x06\xc1e=\xac\xb7&7bL:\xb1\xaa\x81IA\x13\x9c\xee\xb9_\xbd]\xd48B\x16\xdc\xb0\x058rF\x86y\xa5\xb7\x83', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r1, r1, 0x0, 0x400000) 00:52:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x33000000}, [{}]}, 0x58) 00:52:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200}]}, 0x58) 00:52:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000140)=""/246) [ 2609.600582] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.605846] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.611149] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.616291] protocol 88fb is buggy, dev hsr_slave_1 00:52:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x46030000}, [{}]}, 0x58) 00:52:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x11, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x2, [], [0xc1]}) 00:52:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2609.840628] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.845844] protocol 88fb is buggy, dev hsr_slave_1 00:52:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 00:52:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x47030000}, [{}]}, 0x58) 00:52:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x58) [ 2610.400572] protocol 88fb is buggy, dev hsr_slave_0 [ 2610.405922] protocol 88fb is buggy, dev hsr_slave_1 00:52:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") rt_sigaction(0xf, 0x0, 0x0, 0x8, &(0x7f0000000180)) 00:52:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") utime(0x0, 0x0) 00:52:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") mq_unlink(0x0) 00:52:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000}]}, 0x58) [ 2611.149729] kauditd_printk_skb: 178 callbacks suppressed [ 2611.149745] audit: type=1400 audit(3126.356:77899): avc: denied { map } for pid=11772 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x60000000}, [{}]}, 0x58) [ 2611.355064] audit: type=1400 audit(3126.406:77900): avc: denied { map } for pid=11772 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2611.532788] audit: type=1400 audit(3126.406:77901): avc: denied { map } for pid=11772 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2611.706697] audit: type=1400 audit(3126.486:77902): avc: denied { map } for pid=11777 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 00:52:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000}]}, 0x58) [ 2611.853362] audit: type=1400 audit(3126.526:77903): avc: denied { map } for pid=11777 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:07 executing program 5: 00:52:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6b6b6b00}, [{}]}, 0x58) [ 2612.019862] audit: type=1400 audit(3126.606:77904): avc: denied { map } for pid=11784 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.185369] audit: type=1400 audit(3126.606:77905): avc: denied { map } for pid=11784 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.363491] audit: type=1400 audit(3126.606:77906): avc: denied { map } for pid=11784 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.491254] audit: type=1400 audit(3126.606:77907): avc: denied { map } for pid=11784 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2612.606079] audit: type=1400 audit(3126.606:77908): avc: denied { map } for pid=11784 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:07 executing program 2: 00:52:07 executing program 5: 00:52:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6c000000}, [{}]}, 0x58) 00:52:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}]}, 0x58) 00:52:07 executing program 0: 00:52:08 executing program 5: 00:52:08 executing program 0: 00:52:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x84ffffff}, [{}]}, 0x58) 00:52:08 executing program 5: 00:52:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}, 0x58) 00:52:08 executing program 2: 00:52:08 executing program 0: 00:52:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x88ffffff}, [{}]}, 0x58) 00:52:09 executing program 5: 00:52:09 executing program 0: [ 2614.000603] net_ratelimit: 20 callbacks suppressed [ 2614.000614] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.010846] protocol 88fb is buggy, dev hsr_slave_1 00:52:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000003460000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}]}, 0x58) 00:52:09 executing program 5: [ 2614.560622] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.565832] protocol 88fb is buggy, dev hsr_slave_1 00:52:09 executing program 0: [ 2614.640592] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.645748] protocol 88fb is buggy, dev hsr_slave_1 00:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe0000000}, [{}]}, 0x58) 00:52:10 executing program 5: 00:52:10 executing program 2: 00:52:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2615.040580] protocol 88fb is buggy, dev hsr_slave_0 [ 2615.045794] protocol 88fb is buggy, dev hsr_slave_1 00:52:10 executing program 0: 00:52:10 executing program 5: 00:52:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000}]}, 0x58) 00:52:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffff84}, [{}]}, 0x58) 00:52:10 executing program 0: 00:52:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:10 executing program 5: [ 2615.840569] protocol 88fb is buggy, dev hsr_slave_0 [ 2615.845779] protocol 88fb is buggy, dev hsr_slave_1 00:52:11 executing program 2: 00:52:11 executing program 0: 00:52:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2616.156259] kauditd_printk_skb: 197 callbacks suppressed [ 2616.156275] audit: type=1400 audit(3131.366:78106): avc: denied { map } for pid=12854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffff88}, [{}]}, 0x58) 00:52:11 executing program 5: 00:52:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x58) [ 2616.337594] audit: type=1400 audit(3131.396:78107): avc: denied { map } for pid=12854 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2616.500239] audit: type=1400 audit(3131.406:78108): avc: denied { map } for pid=12838 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:11 executing program 0: [ 2616.654375] audit: type=1400 audit(3131.426:78109): avc: denied { map } for pid=12854 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:12 executing program 5: [ 2616.770675] audit: type=1400 audit(3131.466:78110): avc: denied { map } for pid=12854 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x40030000000000}, [{}]}, 0x58) 00:52:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_nanosleep(0x1, 0x2, &(0x7f0000000040)={0x0, 0x989680}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 2616.918900] audit: type=1400 audit(3131.466:78111): avc: denied { map } for pid=12854 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2617.056883] audit: type=1400 audit(3131.596:78112): avc: denied { map } for pid=12910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:12 executing program 5: syz_execute_func(&(0x7f0000000280)="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") syz_execute_func(&(0x7f0000000500)="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") 00:52:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000006000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2617.226937] audit: type=1400 audit(3131.596:78113): avc: denied { map } for pid=12910 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:12 executing program 0: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00', 0x5}) 00:52:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) [ 2617.399640] audit: type=1400 audit(3131.626:78114): avc: denied { map } for pid=12910 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6b6b6b00000000}, [{}]}, 0x58) [ 2617.486601] audit: type=1400 audit(3131.746:78115): avc: denied { map } for pid=12912 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2617.759024] bridge0: port 3(erspan0) entered blocking state [ 2617.813982] bridge0: port 3(erspan0) entered disabled state [ 2617.855022] device erspan0 entered promiscuous mode [ 2617.898657] bridge0: port 3(erspan0) entered blocking state [ 2617.904602] bridge0: port 3(erspan0) entered forwarding state 00:52:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x100000000000000}, [{}]}, 0x58) 00:52:13 executing program 5: pause() syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e1a5f97300661f3a8e16649c675100617b2ee32222414ad04b00c442019dcc0510d46f") syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write(r0, 0x0, 0x0) syz_execute_func(&(0x7f0000000a80)="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") 00:52:13 executing program 0: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00', 0x5}) 00:52:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) 00:52:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000347000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2619.200609] net_ratelimit: 20 callbacks suppressed [ 2619.200619] protocol 88fb is buggy, dev hsr_slave_0 [ 2619.210817] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.000569] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.005793] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.011087] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.016208] protocol 88fb is buggy, dev hsr_slave_1 [ 2620.240606] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.245824] protocol 88fb is buggy, dev hsr_slave_1 00:52:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x404000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000080)={0x3, 0x1, [0x100000000, 0x81, 0xb4, 0x6fa6, 0x7fffffff, 0x6, 0x2, 0x81]}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000180)={0x7f, 0x0, [0x40000072]}) 00:52:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000010000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x200000000000000}, [{}]}, 0x58) 00:52:15 executing program 5: syz_execute_func(&(0x7f0000000540)="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") syz_execute_func(&(0x7f0000000380)="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") 00:52:15 executing program 0: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00', 0x5}) 00:52:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) 00:52:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:15 executing program 0: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00', 0x5}) 00:52:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x400000000000000}, [{}]}, 0x58) 00:52:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x58) [ 2620.800628] protocol 88fb is buggy, dev hsr_slave_0 [ 2620.805936] protocol 88fb is buggy, dev hsr_slave_1 00:52:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2621.160697] kauditd_printk_skb: 142 callbacks suppressed [ 2621.160714] audit: type=1400 audit(3136.366:78258): avc: denied { map } for pid=13768 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x500000000000000}, [{}]}, 0x58) [ 2621.324350] audit: type=1400 audit(3136.386:78259): avc: denied { map } for pid=13768 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.421784] audit: type=1400 audit(3136.386:78260): avc: denied { map } for pid=13768 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.479620] audit: type=1400 audit(3136.396:78261): avc: denied { map } for pid=13799 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.529382] audit: type=1400 audit(3136.396:78262): avc: denied { map } for pid=13768 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.649861] audit: type=1400 audit(3136.416:78263): avc: denied { map } for pid=13799 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.727589] audit: type=1400 audit(3136.416:78264): avc: denied { map } for pid=13799 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.788472] audit: type=1400 audit(3136.676:78265): avc: denied { map } for pid=13998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.895198] audit: type=1400 audit(3136.686:78266): avc: denied { map } for pid=13998 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2621.929718] audit: type=1400 audit(3136.686:78267): avc: denied { map } for pid=13998 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:17 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/21, 0x15) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r2, 0x10}}, 0x10) write$selinux_attr(r1, 0x0, 0x0) 00:52:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)='\x00') syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 00:52:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x58) 00:52:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x600000000000000}, [{}]}, 0x58) 00:52:17 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x20009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_pid(r1, &(0x7f0000000000), 0x7c0000) 00:52:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x700000000000000}, [{}]}, 0x58) 00:52:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000003460000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x58) 00:52:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nn\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0x802}) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 00:52:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:18 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001600)=""/4096, 0x45}], 0x1}, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000140)=""/170) sendto$inet(r0, &(0x7f0000000040)="edd024000000000019a65155921e118708000000000000ace47e79a64a5187876200000012ac6a612e2ae6d0e5dafb34c31fa76fa9d500f905f900", 0x3b, 0x2040000400009000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="dde20f100fc1c79a93ed", 0xa, 0x0, 0x0, 0x0) 00:52:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0xffffffff, 0xfffffffff069c7a6, 0x5e3}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0xec0, @fd}]}]}, 0x24c}}, 0x0) 00:52:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x58) 00:52:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa00000000000000}, [{}]}, 0x58) 00:52:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000040000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:18 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="610403006101e4d1523ef22363bf"], 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000100)={0xffffffffffffff0f, 0x38c2, 0x1000, 0x1, 0xf, 0x81, 0xfffffffffffffffb, 0x7, 0xffffffff, 0x1, 0x6, 0x8293}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:52:18 executing program 0: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_execute_func(&(0x7f00000000c0)="b1b791cd8066410f3a20dc00660f70839001000000fefe4139fd5b3edee71c1dd5c7c6e8e8fb0f01e18b8bf4a95ff98f4808eebce00000802000c421fc51c1c4e13de1eb660f383fd1c3664545186746f34004aee47c073a073a4aaf01000000400f0d18c4c1fb2db706000000f3410f0fd596d0c941d99affffffffd347b4f30f38f63cc4ee54111d00") 00:52:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe00000000000000}, [{}]}, 0x58) 00:52:19 executing program 0: capget(&(0x7f0000000200)={0x19980330}, &(0x7f0000000240)={0x1, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x4}) 00:52:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}]}, 0x58) 00:52:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1100000000000000}, [{}]}, 0x58) [ 2624.400633] net_ratelimit: 20 callbacks suppressed [ 2624.400643] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.410838] protocol 88fb is buggy, dev hsr_slave_1 00:52:20 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x72) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x4}, &(0x7f00000011c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001200)={r1, 0x51966bb8, 0x9}, &(0x7f0000001240)=0x8) signalfd(0xffffffffffffffff, &(0x7f0000000180)={0x4}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) sched_setparam(r3, &(0x7f0000000100)=0x8) r4 = fcntl$getown(r2, 0x9) ptrace(0xffffffffffffffff, r4) poll(&(0x7f0000000040)=[{}], 0x75, 0x0) 00:52:20 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x70, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @local}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e20, @local}}}, 0x84) r2 = eventfd2(0x0, 0x80801) r3 = dup3(r2, 0xffffffffffffff9c, 0x80000) ioctl$TIOCEXCL(r3, 0x540c) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) sendfile(r2, r4, 0x0, 0x1000000000e6) 00:52:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}]}, 0x58) 00:52:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2100000000000000}, [{}]}, 0x58) 00:52:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x20000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7f, 0x2, [0x6e0], [0xc1]}) [ 2624.960614] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.965924] protocol 88fb is buggy, dev hsr_slave_1 [ 2625.040595] protocol 88fb is buggy, dev hsr_slave_0 [ 2625.045833] protocol 88fb is buggy, dev hsr_slave_1 00:52:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000470300000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2f00000000000000}, [{}]}, 0x58) 00:52:20 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) r1 = memfd_create(&(0x7f0000000200)='#vmem1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r3 = semget$private(0x0, 0x0, 0x20) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x5c, r4, 0x504, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80000000}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x52e}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) semtimedop(r3, &(0x7f00000001c0)=[{0x7, 0x100, 0x800}], 0x1, &(0x7f0000000380)) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x4000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000040)={0xfffffffffffffffe, 0x96b7, 0x0, 0x2000, 0x8e7}) 00:52:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}]}, 0x58) 00:52:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001080)=@broute={'broute\x00', 0x20, 0x5, 0xf80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x19, 0x1, 0x0, 'syzkaller1\x00', 'nr0\x00', 'gretap0\x00', 'veth1\x00', @dev={[], 0x16}, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @local, [0xff, 0xff, 0x51c831b4e69da654, 0x0, 0xff], 0x950, 0x950, 0x980, [@among={'among\x00', 0x880, {{0x4, 0x5, 0x2, {[0x0, 0x8001, 0x543, 0x6, 0x3, 0x81, 0x0, 0x21ec4784, 0xa89, 0x7, 0x8, 0x2, 0x2, 0x0, 0xfffffffffffffffa, 0x100000000, 0x1, 0x1, 0x80000000, 0x4, 0x2, 0x3, 0x4, 0x100000001, 0x80, 0xa02, 0x5, 0x7, 0xffffffffffff3343, 0x6, 0x404000000000, 0x1, 0x0, 0x0, 0x4, 0x400, 0x4, 0xfffffffffffffffc, 0x0, 0x5, 0x5, 0x7, 0x7ff, 0x7f, 0x2, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x80000000, 0x80000000, 0x2, 0x6, 0x8, 0x0, 0x7, 0x9, 0x3ff, 0x5, 0xa, 0x0, 0x6, 0x5, 0xfffffffffffffffd, 0xffff, 0x5, 0x4da8000, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x7, 0x2, 0x0, 0xe4, 0x7, 0x1000, 0x6, 0xfff, 0x6, 0x4, 0x7, 0x3, 0x4, 0x8, 0x4, 0x3, 0x2, 0x9, 0x9, 0x3, 0x4, 0x10001, 0x2, 0x1, 0x81, 0x7, 0xfffffffffffffff9, 0xbe3, 0x5, 0x7b, 0x1, 0x8001, 0x0, 0x1, 0x5, 0x7, 0x50da, 0xfffffffffffffffd, 0x1, 0x8001, 0xd05, 0x8, 0x5, 0x100000000, 0x0, 0x932, 0x2, 0x5, 0x8, 0x1, 0x0, 0x40000000000, 0xecb, 0x80000000, 0xffffffff, 0x34f, 0xff, 0x7db1, 0x9b92, 0x8096, 0xff, 0x5, 0x3f, 0xffffffffffffff2e, 0x42, 0xff, 0x0, 0x54, 0x7, 0xfffffffffffffffb, 0x7fffffff, 0x7, 0x5, 0xff, 0x4, 0x8, 0x8, 0x7, 0x2, 0x8, 0x1, 0x5, 0x6, 0xfc, 0xda2, 0x1, 0xfffffffffffffff8, 0x80000001, 0xffffffffffff08c0, 0x2, 0x8, 0x2, 0x177, 0xe000000000000000, 0x0, 0x80000000, 0x35a, 0x100000000, 0x7f, 0x89f2, 0x80000000, 0xffffffff00000001, 0x2, 0x0, 0x4, 0x100, 0xd0d9, 0x7fff, 0x0, 0x11f, 0xfffffffeffffffff, 0xfffffffffffffffb, 0x80000001, 0x20, 0x8, 0x20, 0x94a, 0x1, 0xffffffffffffffb0, 0x1f, 0x8, 0xca9, 0x49, 0x8000, 0x8, 0x7, 0x8, 0x0, 0x3, 0x7, 0xac50, 0x1c832bc, 0x8000, 0xff, 0x8, 0x3, 0x4, 0x1f, 0x6, 0x1, 0x81, 0xffff, 0x80, 0x48, 0x40, 0x1ff, 0x3, 0x800, 0x20, 0x1000, 0x6, 0x6, 0x4, 0x2, 0xfffffffffffffeff, 0x9, 0x1ff, 0x8, 0x7, 0x8000, 0x9, 0x7, 0x2, 0xfff, 0x7fffffff, 0xffffffff, 0x1, 0x0, 0x8000, 0x8001, 0x40, 0x69508583, 0x4, 0x7, 0x3, 0x0, 0x2, 0x1ff, 0x953f, 0x1ff, 0x2, 0x2, 0x2, 0x3f, 0x7, 0x6bf594a], 0x5, [{[0x8, 0x2030284f], @loopback}, {[0xad, 0x4], @rand_addr=0x5}, {[0x4, 0x79e4], @multicast1}, {[0x1ff, 0x101], @multicast2}, {[0x5, 0x352c], @dev={0xac, 0x14, 0x14, 0x16}}]}, {[0x0, 0x2, 0x6, 0x3, 0x2, 0x1, 0xffff, 0x7fc00000000, 0x6, 0xffffffff80000001, 0x100000000, 0x1000, 0x1, 0x8, 0x10001, 0x6, 0xecc, 0x2, 0x3, 0x101, 0xc4c, 0x1, 0x2, 0x5, 0x80000001, 0x3, 0x2, 0x0, 0x20, 0xfff, 0x3, 0x7, 0x2, 0x0, 0x7fffffff, 0x1, 0x10001, 0x0, 0x80000000, 0x7, 0x80000001, 0x9, 0x1ec, 0x4, 0x7, 0x100, 0x100000001, 0x800, 0x6, 0xf3, 0x100000000, 0x81, 0xf70f, 0x9, 0x1ff, 0x7, 0x5, 0x1ff, 0x200, 0x80, 0x80000000, 0xffffffff, 0x3, 0x401, 0xffffffffffff7fff, 0x200, 0x2, 0x81, 0x8722, 0xff, 0x6, 0x369, 0xfffffffffffffffd, 0x6, 0x7, 0x162f, 0x0, 0x1f, 0x9, 0x101, 0x4, 0x0, 0x7, 0x5, 0x7, 0xffffffff, 0x8, 0x6, 0x7, 0x2, 0xfff, 0x100000000, 0x6, 0xfb, 0x7fd, 0x1, 0x9, 0x2, 0x8001, 0x5, 0x3, 0x80, 0x7, 0x3f, 0x2f7a, 0x3432, 0xdb2, 0x4, 0x7a4, 0x9, 0x3f, 0xffff, 0x80, 0x0, 0xb713, 0x800, 0x80, 0x3, 0xffffffffffffff26, 0x30000, 0x274, 0x7, 0x401, 0x2, 0x5, 0x80000000, 0x7fffffff, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x100000000, 0x1ff, 0xe24c, 0xfffffffffffeffff, 0x0, 0x291, 0x40, 0x1, 0x8001, 0x53, 0x100000001, 0x10000, 0x1, 0x15a, 0x7, 0xf4, 0x6, 0x1, 0x5, 0x1ff, 0x4, 0x4619, 0x3, 0x80000001, 0x1, 0x800, 0x1e, 0x5, 0x2, 0xffffffffffffffff, 0x5, 0x20a1, 0x84, 0x80, 0x400, 0x4, 0x6, 0x9, 0x10001, 0x81, 0x19f, 0x0, 0xfb, 0x200, 0x100000000, 0x7f, 0x7, 0x2, 0x1, 0x1000, 0x4, 0x9, 0x57, 0x2, 0x1, 0xbe6, 0x9, 0x2, 0x80000000, 0x4, 0x4, 0x1dd9, 0x101, 0x6, 0x800, 0x0, 0x6, 0x8, 0x100000000, 0x676, 0x4, 0x80000001, 0x58, 0x8001, 0x1000, 0x2, 0x400, 0xfffffffffffeffff, 0x8, 0x8, 0x269d, 0x1, 0xfffffffffffffffa, 0x10000, 0x9, 0xffffffff, 0x2, 0x6b65, 0x80000000, 0x3ff, 0x7, 0x6, 0x93d, 0x1f, 0x5, 0x0, 0x1, 0x40, 0x3, 0xbfb2, 0x7c9c, 0xf2, 0xff, 0xfffffffffffffe00, 0xfffffffffffffe00, 0x2152, 0x20, 0x5, 0x4, 0x11, 0x3ff, 0x0, 0x5, 0x2, 0x44, 0x6, 0xfdda, 0x10000, 0x6ab7, 0x10001, 0x9b, 0x0, 0x7fff], 0x3, [{[0x17, 0xeb], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x461, 0x6], @dev={0xac, 0x14, 0x14, 0x28}}, {[0x3, 0x166], @dev={0xac, 0x14, 0x14, 0x1a}}]}}}}, @cluster={'cluster\x00', 0x10, {{0x8, 0x6, 0x5}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x7, 0x20, 0xebff, 'bridge_slave_1\x00', 'nr0\x00', 'team_slave_1\x00', 'vxcan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0x0, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1a0, 0x1d0}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:sysfs_t:s0\x00'}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x4, 0x6005, 'sit0\x00', 'bridge_slave_0\x00', 'bond_slave_1\x00', 'erspan0\x00', @remote, [0xff, 0x0, 0xff, 0xff, 0xff, 0x2325979bf342fbfe], @dev={[], 0x20}, [0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xc5}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x11, 0x8, 0xe035, 'syz_tun\x00', 'bond0\x00', 'caif0\x00', 'yam0\x00', @random="a1a6d962a5a2", [0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xd0, 0x200}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x1}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x80000000}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x33, 'system_u:object_r:crack_db_t:s0\x00'}}}}, {{{0x3, 0x10, 0xcbdf, 'bpq0\x00', 'lapb0\x00', 'syzkaller1\x00', 'veth1_to_hsr\x00', @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0xff, 0xff, 0x0, 0xff], 0x70, 0xa0, 0xd0}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3752}}}}]}]}, 0xff8) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001500070000000000a85af99a3703fec3"], 0x14}}, 0x0) [ 2625.450668] protocol 88fb is buggy, dev hsr_slave_0 [ 2625.455988] protocol 88fb is buggy, dev hsr_slave_1 00:52:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3f, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xad, 0x200) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 00:52:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3200000000000000}, [{}]}, 0x58) 00:52:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}]}, 0x58) 00:52:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x100000003, 0xff) write$binfmt_aout(r0, &(0x7f0000001240)={{0x107, 0xffff, 0x0, 0x323, 0xb4, 0x0, 0x20d, 0xfff}, "647f32c1c1d86f8cfc65efb391ddaf1eb26b24c6b36aed8781066a98621d46d5c54c4aa9ca7ee137f16e38c96aa9123c2dbcfac9b5042ba5471a99e0cff9", [[], [], [], [], [], [], [], []]}, 0x85e) sendto$inet6(r1, 0x0, 0x3d4, 0xfffffffffffffffe, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x7, 0x6, 0x9, 0x8, 0x9}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r3, 0x1000, "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"}, &(0x7f0000000180)=0x1008) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x3) 00:52:21 executing program 5: r0 = socket$packet(0x11, 0x2000000000002, 0x300) set_mempolicy(0x3, &(0x7f0000000240)=0x6697, 0x5) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/29) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 2626.240608] protocol 88fb is buggy, dev hsr_slave_0 [ 2626.245795] protocol 88fb is buggy, dev hsr_slave_1 00:52:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3300000000000000}, [{}]}, 0x58) [ 2626.427126] kauditd_printk_skb: 156 callbacks suppressed [ 2626.427142] audit: type=1400 audit(3141.636:78424): avc: denied { map } for pid=16025 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x200000e3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x8000000002, 0x0) ioctl$sock_ifreq(r0, 0x40000000089f3, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x045\x00', @ifru_flags}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xa080, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000100)={0xc, 0x82, "b6c645776f7d2b5274bf7b7019b8217450a80ad1110fca2aecf49fc2689ba41bb54ac618a2993d0bc9a5a11cb51ee2042cfc67b506e79e9814866fc1da3c1f697ced57642b721ac032d86f634b88dbcbe12b1502120eb4f5a8f0e4b8d12c65c032a4d5731e7f8c4c88f17415a54676e800ad33670ef38b0dba1dd95579bbfea10101"}, 0x88) 00:52:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2626.607975] audit: type=1400 audit(3141.646:78425): avc: denied { map } for pid=16025 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2626.825759] audit: type=1400 audit(3141.676:78426): avc: denied { map } for pid=16025 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4603000000000000}, [{}]}, 0x58) [ 2626.968683] audit: type=1400 audit(3141.686:78427): avc: denied { map } for pid=16030 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000}]}, 0x58) [ 2627.112849] audit: type=1400 audit(3141.686:78428): avc: denied { map } for pid=16026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2627.256417] audit: type=1400 audit(3141.696:78429): avc: denied { map } for pid=16026 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2627.400712] audit: type=1400 audit(3141.696:78430): avc: denied { map } for pid=16026 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2627.523331] audit: type=1400 audit(3141.706:78431): avc: denied { map } for pid=16030 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2627.595284] audit: type=1400 audit(3141.716:78432): avc: denied { map } for pid=16030 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2627.638773] audit: type=1400 audit(3141.716:78433): avc: denied { map } for pid=16029 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:22 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0xfffffff, 0xffff, 0x8, [], &(0x7f0000000140)={0x9a0912, 0x2, [], @string=&(0x7f0000000040)=0x1}}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 00:52:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x58) 00:52:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000034700000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x420400, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)=r2) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x67}}, 0x0, 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:52:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4703000000000000}, [{}]}, 0x58) 00:52:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2629.600605] net_ratelimit: 20 callbacks suppressed [ 2629.600616] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.610803] protocol 88fb is buggy, dev hsr_slave_1 00:52:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x10020006007, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'syz_tun\x00'}}, 0x1e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000100)="2375f598b3ee322fc577b82860321e0805033f4b61ac2122f39076d804321e7f76ba73783f8694acbeffc149bd5e96c9dc0277f4cedf014a21c02b47e7b321ed5b353b98fc55275aed88684263de3e8e33ea8acfaeeab98a40e2dc8fa8beca22577b35b02a24ea8f", &(0x7f0000000240)=""/248}, 0x18) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2e2f66696c653080"], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='f2fs\x00', 0x0, 0x0) 00:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6000000000000000}, [{}]}, 0x58) 00:52:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x58) 00:52:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:25 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x18) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000000c0), 0xfffffdad) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0xf6, 0x5, 0x7, "cd0deec52895a5dba869f7e31e8e28faf89abc4192b660de6b7cab3ff0c5fb84b68c4e42b56441d89e8f18f2cff3223fbe88698a66320ffd86bd78cc0c1302622833f8bb4cf75d474bcd730ccf90ae7770e2f0fa194bdb5cbdc628832a991ec5e8b2e80a75898bddb7789fed142a28980069b95042d2cf3c2780d8b1829627216d7d16c8e3b9f2c69d2fbd56bfd3eeea341c273e74c096063b97d6e1a4854f517cadf93077a294808c27f54fb8d1042205fb6a00b09513d7e925a1951de64e2ac65fa11e1247f43bf103ca8351f45c0077c134091afefa866b640c81355d4ec3f8c9516e738211ed18908848ee7a0490a15ada88469c"}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e24, @remote}, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x4, 0x7}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x101) 00:52:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0xb) socket$bt_bnep(0x1f, 0x3, 0x4) 00:52:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6c00000000000000}, [{}]}, 0x58) 00:52:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000}]}, 0x58) 00:52:25 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={r1, 0xffff, 0x2, "156e4cd71465e71a70c7c1a2d9e73effd840d1d4be3e6a64dc19ca9581b4b4217e9f0babef2443"}) r2 = socket$inet6_sctp(0xa, 0x1400000000b, 0x84) prctl$PR_MCE_KILL(0x21, 0x4, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000000)={0x15, {{0xa, 0x4e21, 0x2, @mcast1}}, 0x200000}, 0x90) 00:52:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x28) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x800000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x4, @empty, 0x2}, @in6={0xa, 0x4e22, 0x9, @local, 0x8001}], 0x5c) [ 2630.400631] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.406308] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.411607] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.416758] protocol 88fb is buggy, dev hsr_slave_1 00:52:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x2) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0xfffffffffffffeb8, &(0x7f00000001c0)={&(0x7f0000000200)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x22) 00:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x84ffffff00000000}, [{}]}, 0x58) [ 2630.640608] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.645792] protocol 88fb is buggy, dev hsr_slave_1 00:52:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}]}, 0x58) 00:52:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2631.200593] protocol 88fb is buggy, dev hsr_slave_0 [ 2631.205900] protocol 88fb is buggy, dev hsr_slave_1 [ 2631.450602] kauditd_printk_skb: 132 callbacks suppressed [ 2631.450619] audit: type=1400 audit(3146.656:78566): avc: denied { map } for pid=17552 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:26 executing program 2: r0 = socket$inet(0x2, 0xa, 0x3b64) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) r1 = getpgrp(0xffffffffffffffff) ptrace$getregset(0x4204, r1, 0x203, &(0x7f0000000500)={&(0x7f0000000400)=""/229, 0xe5}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\'eth0:eth0bdev+[[\x00') r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x14002, 0x0) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0}, &(0x7f0000001800)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0}, &(0x7f00000018c0)=0xc) mount$bpf(0x0, &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='bpf\x00', 0x4000, &(0x7f0000001900)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x9098}}, {@mode={'mode', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x6}}], [{@fsmagic={'fsmagic', 0x3d, 0x800}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_lt={'euid<', r4}}, {@fowner_lt={'fowner<', r5}}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r6}}, {@subj_type={'subj_type', 0x3d, '/selinux/enforce\x00'}}]}) connect$bt_rfcomm(r2, &(0x7f00000002c0)={0x1f, {0x200, 0x3, 0x4, 0x8000, 0xffff, 0x6}, 0x7}, 0xa) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') readlinkat(r2, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/138, 0x8a) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xf4, r7, 0x320, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x17}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9d5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xe6}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa47e}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x83a5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40000}, 0x1) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, &(0x7f0000001580)=""/175, 0xaf}, 0x20) sendmmsg$nfc_llcp(r2, &(0x7f0000002ec0)=[{&(0x7f0000001a80)={0x27, 0x0, 0x1, 0x7, 0x2, 0xc00000000000000, "f43b7cc037e0e6377273362792cd954e1ab84cc6d6a9f5dc70f3fb886a96e526d2ad0fa1a3beed5808fab0e359e52fe4227499c569a4921daaedf801f526b8", 0x3d}, 0x60, &(0x7f0000002e00)=[{&(0x7f0000001840)="fb32e36b7ae2b747c3ba285179e6d9485ce9c8e5095a5ffb5c4c4bea", 0x1c}, {&(0x7f0000001b00)="185464809779b36dad2387b893cd1a8e73cefadf68248f94a19e966063ad6507427abc4b59b1dd66224362d99aba43e4c78ae8702c1d2623e91acdad5b303494e1cc5049ebc2945aceacbb864ea96a808a3eb1eb3ca0867b2e8ac8ac230abea0ee860dbfb7093ca42fe845e6ff0ba0b9dedd98daf8a1b91462d6f60826da55b112731e205d32c78c57ea48c2542ab4d1ea7e0dc854a4f3ce3f288d6bf6907376437d14a2262df3ade83654104b8aa5e7baf32ca7e2b776f7473ccf9485bb5fd3072fa7ebe62b818a4829e0f2ee40ca3aa292e3442ec03966872143930e895d517b93c29691fe837b445734578caf6414d73f05cb625ac56ada05cd6ed2f7047ef1231b80492130907d618721eaee02dfbc06566d01e3699d5c0b9f8f34227626674ac82690805e848a0d35cd4648e9303f3610de75e05dd62b2958da8e8f37dfbdccac98a282b5bac4cafa7a28bbb8cd3cae8be6e2f9c0b34beda0d9ae50229c0c80b71faf74f353c45bf044bc7ce380f388f701b7824d048ebc47d4d0dd9e461a9d8dceef12d115a213e96685cde22a09f20d38549bd06a5ed25eb96f09557f50a95a3c240bf469978bebefdee77a081c315e29cfb1d39f6ae0c1cdbb3abdaa33a67534214fb76544315dbf2827e174c7f719bf609464f9d91efde7f63e66f385733bb9f89203628a477859e661f1e66a82b792cbfcf2bef8058e143dc422d84afed1d260b1757eb7a1dc7664af67f77a798db1666ff3dea01e05450f42f6fd8fa05f3c9ce506dd372175432251cc641e6840eedead4b2957d6c331796874062c71197b585897a49ae651a95474697f3ca69491a1fde2b1171016e574af4dd122a12e226095666ed7d3a633a6c8df966b065f20433e0894f25bbc53f2218425faafd350b395e97048f195e18e14c166d1020dbaeb1535ba306fc14496b961c4f7593cf8fbe8f59f171a58ac62da8ae0bd029596dcab8723f35f380ef99c88698e29f015320b550287afc7c0d95bf49b87cb816ed5da63193c3a3983997ed8f3e7e61776f22721bbe322e05111ab105071933c8f5eeb61438a18b26ee959d735637f25dec0bfaadaf54c16d99ee2abdccc76a5b38ad7a8bcba86366231c4826e26216473dde8f93c088011f386da7c998f73e48efdd64b8dfe7ab583cd80a348f7e1ffd1ed612990818b2d50e1de7d4b46313c7cd51ec272aa675424a058f35aa25727ddb3d28d5f129e3200d3778f0ad7790e2f06c933c37a7662da561def46e0332defa0a2c292a22728029bdc51c35c0a8d4931106c1499a0cc2371c5f37e337d9ab03ca1d0f9852beae9ff4f879e7282401ef1bc9c418cb7f406fc857697617521440acffe4b7ee3a4f48bdd1c7bf2862ba898800fe4bfce84989e77a10e3915997080a6ef062c25a0bf517ca8e2e6f51f6c11c292808d41db505b672a60facbcf619b5354f8ce750891566462f366c2a8f48f945e14bbb61ad1145c8dde8341aac603413cecee17465e8913384a6640e1c50841e1d35a06680832eccd020dcb2ddc200038d6d576d39be4bf660ecaaf74cbcedf2021950fa06b1403b7c74a17049d2d4a9c7a1487deb9d4084f6dd32f098d4da6b12e7e17e44242ca741faa37b5ab140da76ae5efba852b22820dae20210b9deccc1a686658a16b10e27d347685e5a1c9b506faeb492098db453025c70f3cad1e52e70a9c105e994d20a93fa1a5a0b4582a731432eb9bcfdc1be19dc09665821364f1a63b3696150f03172bc6d6de3d81f057d654b012ac5fde721146cf8586b5612075ee6a3678b2409f3b22ee1a550761a99be6ee3e2ae648e8638f62ab0c227648580684022edfcef11d57d7dbffe597e5c48377f32d08f715a904af80a1665a7927279be0dc620720307db6d3ed29fcc4f63b587ab3423d3f95495a8bc88144c2ee88e5bdf5bcf5ca8def8d348a78ba156eace93f4dc0e0833eefcb8e74d50757014ae9107d5677768f38a2e77546e2baaf8f0b6b1cbf6304928fc5b281609aa5e59a728805cf6b7aefadf20e6dc67c4da696b63a80e95c28af71f25b04643b5f6e4f0fea788c35e7884ca5c20f3b7d64863d9ce4d62958f7224ed1ac6ae71ca4ea770d41b9be22fb14cbb0370745a50618ce3ed27267d25f21b80f07efaa9589f7a27821d8a0de11f0abf60c2657afe64b60d76a850050b3227c41dfd6f148ee6190edebc4a17daa5e84d46d7b0a6df52bfcfb0fdf4b5bc07748ff6f5b0fca56b4481b156bcf17312a43753027906d879fc7e7ec5c8544ed164fe9c8957faa8a06d28bb3e2dea3380b65aaf5de1d7a1238f7193c2258af5b8c35e41dc9e88d76cc897dfd9bdb9f63c5e9b5ced0b1c2f56e47a87323b6a0ddb670feab28571a3dc017983d57e9c270cfbf6ce6b3ba36701cb83657476bdd35296379c0ee8de8125d4601cb3d37b1a640b40e20a6a0de4fe64c09e3f2c7f9091791daf369c169fc7c6b7fdfae4a48032ed8fae6b911520194a5fc39643bccd11c36d64d23d45f0e6d7170a9e255e507d5a79eb1d1a4b0907441c211fc1dd003d900e8a42a793eba825bbe71b7a6a99054c81cf53801655d214c2bbdc7df831b6af5e95680dffc14306293111ee36286864e263cf04c66a0ab645bc87549422877fac9fbe688b1e37509fe5f9f9c258010046a3fcff7294571f510b69a2bc706c76e10b6175565d319bdf9471bf049ccb26410e30260ce51fa447cab0693f04968756a56352b2ae91d0a2785d52bd7d15a6d43ebd4251b107918924c7f952958ba294b3468f77c24f802752c133d366b25b7980339a9a357be46864f8c1ebaef950b4383f5aef7e099d05d863a693d8841b9784f3a4c7b188b87d69b9f124fdb92f48a7b4654b7389c062d0108cfb5bb7f0f454314a02105a524acf0933e7e9478c803a2150c041fe0842b3a9d320558507ec3f7dfa8dec4f71f3f959b109eccde257486dd54a64fd52e8ee57be9db98e61a2cf19b26e615e26e340578f142843e965615e686d55e4224853468545a32d46e06f052956ffc434d738460f05048fc51e3403018e68ad65fe0d45817d5268b9bdb8bc1854a91cf15ccd99377b0c115b2d36cf3ccb682991559e77a1ec41b8cdda591e7a2b2cab104f7840a1918ed204435d96b7fb022e205cc752b23cd35bd641f2a52e20ab51c113e9784c298c3a009d461ebc6206fe03c44222a2b8280d94bda1334b8a466274243813dda46f4f84064a1a6548a3c3024c42e8562831e9bffda3e367cc4d4f0d35e756de605df1ef8d034d1fdb27f4ca6f0ea2744e5be4987e8a943f45cea6ce9681d02973b1cea2a722cb849a55a3077ffeedfe313cda4d80c2e9830553af5d167f22047bbf8cfbc6850c5fb3554865318175b5df8182bdd4727ba97174a9f0435825238583333bc1331699150f25702bf2b2a0a80a41019461c41967607d7021ca8b4dc32401b74f25b6bbe997bf36226ebbcf5fd37103beec4b8596c62e6f4ddcf31bc463c1556d98b1a988628d3af649721309a28f18a8304d094c52218f3bb66a0f22995a3ce1b377fb7b5247215595a88ce8f4b28b1edd7c1b9171ab45ce84bb51a74ebf543a20f3e5fa2c1714fc718ac14aca0613c2b39c7c2640355c37044c3afba3d48e6344236b2a1bdd666ff71b3a4512a96b6fb09dd755471c5d2f57c08e2347aca8c0ade583bd4f6bac970a286401f7dd6637aac79346230e206139f002fbfa5c12f5452834f68f24023d370c2d6023a0714007df0e700da783344ab56d9f271e02e7f5d34beb7f7cfcb3fd3b45791a8b2f6b4f3da4756471197975a3bc9d65eca85a02470e7e54b3665e798928f74185b47668e8252d37cea28689fdcfe793ccd6651d54b8eb8af866c2946238bef1aab1b462c218a94c9764734c4877178967ad5cbb41db71f9b81f8c8147e7618b4307f59ddbcca4885393eeeecd1388fa5fdfb1ee0a3783bb1300d4462697a3501c89bd589b2f12953c669d3d232c401cce5961597b977e5470821389b6790e578a2671086254068bdce15fe84344c68f2346b17e7cffee535ae0af420a78b620dc6a49f3e96fca2fc38fd4aad7dcc3418bd3b04210003709355a7349801834d5aa59b6e8acf472358c59f994056c7b52132d749d27aa3664c80681d6bef3b983cf8c8d8c35290a923e137e8426af0747bd224236d3c7fa286bf1086773e4e967b37d6b33854c621db1c9d5807df4d8744d5c3982b89b7a65acf023fc4fdd417a519158e0c6d62d958b3bcee7b7e7bbf22d7be4db0be717ceccb36735fcf071689afc1f10d4b93bff69d9ea17cf0b0b6342923dbc59b55453ce86029abe2cf709fe0ecc0d73a10da22a60edd751fafb74b57a227f0223819fd032b00f403ccedf357699be62b7e99fe3bc488d98d91258846bd9e903dda65dad328708652c49790a42142d9a0e71899919655aa3b1c76585168b4dd9e38be134c0016f6c1296d9555e975cbe46506c557c5ebf848bcc19640d9dda43d7004fabfc5104ce5a8f14bd72ee02747cf152c1f76e4264e24b663c802a631ff268664ec51da6e82896d4ade4dd09ca19fb0848dd2af87a6fdf457ab8b293688bcb962fef00e1adee2888e58d54188128a911e8d13ae959ef045f7d49972c2ca245aa823f38fa3d20f2472188cb127f814b98e846390ae28a566e10e50e562f531def55b8436330c65c9117c8fb15d176ed22f6451ff06aa5c0b3d0632c20b65f2bf618fcf5400010eca62679ece487ab701904537f087657b6368c8221eb89d4b191bf603d80650a6465608a09a5b5a86609e19c21542bfe269958cc302e651dc9948a7d6f9be24701d3ff426f267cec88c847c1fd349bbc3f6532c6a802e43caad0fe78f6053892d3463fe515f02e4a52ed30fbd4944984d9a25b7ef15b0252c04c33613968cb1b1317c0868413d2da123bf6237fe583bb6a22b86e36ed1a01132052bc26ab10af45799f31916f87eab157e02973064e19303ba66a2a8bb2c79d71287aa7f9ed0362c3ec0ac5cc45374473be00b35f993468bf6963bf9eea79b9b789f0bdacefdbe219db8c2883a29170cfb93b38c168093a99ed514ba3b14bec8a132a415fcdbc1012453943f306e3f4a731e7e4ad37cc131a221b44e8dbaf7a4cdc6b897bf8e7c041329ba2f694c5c42b7ba9880c9b706db6f7ae36536b1a0c248ff436df8112f824a824c9a3cf62cff3f57844c186edcbc75e11b17159fe8c58fb07d14d615a9b64dbdc751acacddc8e8d36f69eee4aeb67b209ce19cdd498001fc7f449b0830dd3f47f9c8b6983ec6965a8bbdd1a9280a82e4bc45df76ecb56fc0782dc081a94cf714fbae5336a7d78aca17bab36dcc8a9773d1bd536983a6d54312e3160cd3dfdbe946c9ef8b41a5f6886cd0cec2879af44066dd5bebdad8348cbb7ab7830191694467d89a8d571f284a4e9281ccf116cc29e1f910f7e3790aeba1ce6af908220274179ccdc5a6dd55b5e039b3ec20b8d5bec5570a54c8e86e67ad211de3a033492ed3dc47a1748529315766c065f55d13630e1d259a2a529d3bf1cb8d2e811857ff2b417da483cf279afe4917541d6d887c4558002fb68e8e0fab844e26393f2313b06491cca1790ac7a0047a5279117e70db80eff7c6f8bfecab76b9952b05be1bbbf83b233ee899c411c1047d71c66a0249df1a9231876d6c534ae242c767fea9d72314a70271328f93c1e98378fd7962942af21de3b6bf192b6b43e0a22f88e9d2d4a2f99757b5938c577b64a7f996cafef7ee1c8f04db091ef8827ff303a2", 0x1000}, {&(0x7f0000002b00)="0bfd0f993a6b8a13b66e262c184cb33878acc05d4beab5009d75238b09e640d978bc0c617ca21c05affefcc388a41cd3c8469db86400347e0aea195f78821a8aaa7e9c04c8799ca7b5646e97ca8527c183e23cec24340b26647e869315d5eb48463ca625e551c8074c20d820ee6bb967563c6d2502cbaffb24d85542c01dbb75c63f7a29ac0c5a7e010f58dc60d7623d1f88716f40c25f5f93f6578c3b39a045cc4b397d", 0xa4}, {&(0x7f0000002bc0)="742ec0709a7fa180f2a9dce687e7dd310ad334ffbc48b79c85d5479171def1b96bb9befe3c4819c0ecc3fd6d9221afa369d79239c6ba40b341d7cfe5cc892e831a50f2961d4f25ca6fb1ec79995335d7285fab42e7409093b4902ce2255f67c7f0a2aa8976e85fa2621af7b27e", 0x6d}, {&(0x7f0000002c40)="4a9560bb1e4113fb066f1f844a2863a5686e6900bbffdaa39443fb62e2a58e85321283ded8adcf6d0c5e09ec9340d0d1024191840ea0df6076768457d19084f4542ab6f5d7db325ec24fdb02643773c68df2569553bdf7cffc3f29b6b110862033015543da940507872dfc19c3dae30563e845912b008674c5ca8f27e8905a2e7761a143a10b33b3aadf930e9aa097291fc488546af04956c5", 0x99}, {&(0x7f0000002d00)="d7b9a322faa3afd8c799abe3fe972cac0d21e626485ef0a188388e0f9db48bd5208189760792f3fe2150f97d52b96477785ac1b31dbc51a4b83695c1a2389dc7a4b835a53daf7bf755380b1d0692f0d4135e65f7dca6d172ace9896fae47c2b34f92b2b2aa3369118720bf83b70a1d68e50ded7582ce0e5d3480d63eed2353d5436453cee849109889a4d1ae468edb53187532e50196ba7c75a3abc75c", 0x9d}, {&(0x7f0000002dc0)="c79d5fc954823594266b22846c73", 0xe}], 0x7, &(0x7f0000002e80)={0x20, 0x11d, 0x10000, "384e4fec73640315e19f39fdd047b84c"}, 0x20}], 0x1, 0x840) 00:52:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x88ffffff00000000}, [{}]}, 0x58) 00:52:26 executing program 5: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x101, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0xbd, 0x279d}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x2000, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair(0x13, 0x7, 0x4, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000002c0)={0x0, 0x0, 0x103, 0x6, {0x0, 0x4, 0x10000, 0x2}}) r4 = dup(r0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) pread64(r1, &(0x7f0000000380)=""/217, 0xd9, 0x5e) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000180)={{0x7, 0x2, 0x0, 0x7434, 'syz0\x00', 0x57}, 0x0, 0x200, 0x5, r5, 0x1, 0x9, 'syz1\x00', &(0x7f0000000140)=['\x83em1em0^em0loselinuxloproceth1ppp1\x00'], 0x23, [], [0x1ff, 0x7, 0x4, 0x5]}) 00:52:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x200011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x8000002102001ff1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) [ 2631.623404] audit: type=1400 audit(3146.656:78567): avc: denied { map } for pid=17636 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2631.773660] audit: type=1400 audit(3146.666:78568): avc: denied { map } for pid=17636 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.937961] audit: type=1400 audit(3146.666:78569): avc: denied { map } for pid=17636 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x40) connect$caif(r1, &(0x7f0000000040), 0x18) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x4f) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000000003, 0x5c831, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000140), 0x5, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3890, 0x200) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000000c0)={0x1, 0x80}) 00:52:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x58) 00:52:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0xe000000000000000}, [{}]}, 0x58) 00:52:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2632.067207] audit: type=1400 audit(3146.666:78570): avc: denied { map } for pid=17636 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2632.190863] audit: type=1400 audit(3146.696:78571): avc: denied { map } for pid=17636 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:27 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x3000)=nil) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000024c0)=""/4096, 0x1000}], 0x1, 0x0) [ 2632.366657] audit: type=1400 audit(3146.696:78572): avc: denied { map } for pid=17636 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2632.518931] audit: type=1400 audit(3146.716:78573): avc: denied { map } for pid=17630 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2}, [{}]}, 0x58) [ 2632.712767] audit: type=1400 audit(3146.716:78574): avc: denied { map } for pid=17630 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2632.798681] audit: type=1400 audit(3146.726:78575): avc: denied { map } for pid=17638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40000) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0xfffffffffffffffd, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000380)={0x80000000, 0x2, "17ead05ef9b3369ddb2ad3b73ab920461413dedff1d7da8dee721b7afb25aad3", 0x6, 0x1, 0x2, 0x1, 0x4, 0x2db, 0x5, 0x10000, [0x9, 0x1f, 0x0, 0x54a]}) r1 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(0x0, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000317000), 0xff8) 00:52:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000bc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/?G\xc7\xea\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xbb\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4Pk\xc2Sl\xc1\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6') ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x7, 0xfff, 0x100, 0x2, 0x8001, 0x1ff, 0x800, 0xff, 0x0, 0xd981, 0x5, 0x6, 0xcd84, 0x7, 0x6, 0x2, 0xde, 0x375f335a, 0x8, 0x4, 0x7, 0x80, 0x9, 0xae, 0x8, 0xfffffffffffffffc, 0x0, 0x8, 0x5, 0xcf68, 0x8, 0xfffffffffffffff9]}) sendfile(r0, r1, 0x0, 0x1) 00:52:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x58) 00:52:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000500000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:28 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) sync_file_range(r0, 0x3f, 0x0, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000001c0)) r3 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000400)={0x9, "88acf6ea0e94a16223af2b05b435f61a2cfbfab55bb8de33e0a33be841344fe1", 0x1, 0x400, 0x793, 0x7, 0x1f, 0x0, 0x2, 0x2}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) recvfrom$unix(r2, &(0x7f0000000280)=""/69, 0x45, 0x10000, 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x8000400) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x801, 0x0) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000080)={0x3, 0x100, "846fd2a68b3f61d1f928761ab28a113ba5d2f4798b508e376a990fc9261d4f84", 0x200, 0x1, 0x5, 0x1f}) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000040)=0x1f550377) 00:52:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4}, [{}]}, 0x58) 00:52:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:28 executing program 5: r0 = syz_open_dev$adsp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000480)=""/4096) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000000c0)={0x6, 0x4, 0x6, 'queue1\x00', 0x78f226f5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x5, @loopback, 0x45}}, [0x3, 0x537d2421, 0x100, 0x2, 0x9, 0x4, 0x800, 0x6, 0x4, 0x7028, 0xb5200, 0x4, 0x4, 0x5, 0x8]}, &(0x7f0000000280)=0x100) fcntl$setown(r0, 0x8, r1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r2, 0x6, 0x10}, 0xc) ptrace$getsig(0x4202, r1, 0x4008000000004, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000300)="440f0163ecde9c557555758ac2c2c97342d3174a4696c4a21dbdf1f730f7302e67660e5067edc482c5905c7619feabc4aba39dc46331799bfeefffff8d1ee54c4c0fae9972b571112d02") 00:52:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x58) 00:52:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5}, [{}]}, 0x58) 00:52:29 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000936000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000007000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000a7b000/0x3000)=nil, &(0x7f00000db000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f000066a000/0x2000)=nil, &(0x7f00009cc000/0x1000)=nil, &(0x7f0000071000/0x3000)=nil, &(0x7f0000346000/0x3000)=nil, &(0x7f0000000200)="a05d56e510dc18676ef599b7cbac0a35eaa601b03be4cfbc1fb550831ff51957334bba145637c0b9d2b58d31d6dc809262ef51e2c3cf26b32371429578810cd1188bc77f153edeb531ec837302f0db465df8abfdb5ba1b61fff9a3b328abf1ce5b0e2d1c6522239b5702b5fdae51604c322339a9cde53a67124807d271662457f531572b219dfe1d7a70ab195476e18e0e2d6bb96ae59f526fbd20a62dcdf8346e36859d4e3b641927805298ba2aa3d3ef9df6684fd722ce61e12b222be82ac9564948dcd25a92a8e647f92f5df8cc4372b8f6c48bc2045b3ad0e387526141", 0xdf, r0}, 0x68) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r2, 0x40) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28409fe1e22fb52a87e30d000010005fba0000000068dbf10a5ff84f37", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) [ 2634.575181] IPVS: ftp: loaded support on port[0] = 21 00:52:29 executing program 2: syz_execute_func(&(0x7f0000000140)="0c1af3420f2cdf98cd80f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4f4425d82822a00c4da7676f2168f4808eebce00000802000c4c3dd6d680748366f8fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3dfc4c169dcfb4336660fd2938c000000440f181cfd3d2916206666450f17720d14111d54111d00") socket$nl_route(0x10, 0x3, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) fdatasync(r0) 00:52:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000034700000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:29 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x15) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@mcast1, 0x66, r1}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r2, 0x28, 0x0, 0x0, &(0x7f0000000100)) 00:52:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6}, [{}]}, 0x58) 00:52:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x58) [ 2634.800592] net_ratelimit: 20 callbacks suppressed [ 2634.800602] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.810809] protocol 88fb is buggy, dev hsr_slave_1 00:52:30 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) splice(r0, &(0x7f00000000c0)=0x29, r0, &(0x7f0000000100), 0x2, 0x7) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-fixed-time)\x00'}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) r4 = getpid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000003080), &(0x7f00000030c0)=0x0, &(0x7f0000003100)) r9 = fcntl$getown(r0, 0x9) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000032c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003340)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003480)=0xe8) lstat(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000003600)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfb, 0x40000}, 0xc, &(0x7f0000003180)=[{&(0x7f00000001c0)={0xf8, 0x3e, 0x800, 0x70bd29, 0x25dfdbfe, "", [@generic="2927bc03fa5d44bcccffda2e7af09c82f11c7c43d3b14b1871be646d70cea1557cf6705fcaa77a36ed3b744d516b80313c3a17289450a2d0309e9c795712999e89ec747b1861da5b4fec395724efa433b350bd5cd6d57a6ce7d93dbdad827e45f74aa672c30259e26f66bf3af46ebe19262d0f86a7863d9824b7ab8b57d3f021acf32dd17bd429f0b5804b16b5290d3f6ad09969a893532220cd6eee60f4e38717294e6bc0c484f0568f0a38a3848e2c4dd1938312ccbf6422b8a1048cc8cded2fd1891357530393d16dc8676e4c00f325a22dd53ceb1ab938006f03b63e26693c2a3e36ceb6"]}, 0xf8}, {&(0x7f0000000500)={0x1770, 0x34, 0x300, 0x70bd2b, 0x25dfdbff, "", [@typed={0xe8, 0x67, @binary="d6031660ac92434a7f1976d3e48b6493a0dc0910b532e6a880e2bd4800018cf243f17c27c21ba44c12f24dc3ab321a979877080876987a50ac6331bae2fd6d7046b3b151a8a047d1457a7f13b5595100b3617823b19f103e053acad93177a07611a949fb122bd8bfb430c2ebe89cd6ea818dc0899465409d6eafa72b34e47fb16f0b4514898a9390251e61671a0e8f823d1765b61b86116b41fbeccb985af99a3e335729ce2314cc3abd13776e38ea8e68b5fab2fd320ee02185b8812503407b489b2bdfb1ed411afb56745193f932771a656639e46819c7b52bf4db166fddb033cb2b"}, @generic="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", @nested={0x364, 0x75, [@generic="299a47de2cc2453c582dd1f992d081430dd76bf0d402de566f0080efdf4ede67926c8ed443ae7e4702895833f75ed989ad9de5f46ef9e935feaefb2f00e7", @generic="08430cf3dd31f51e3776946c1e1478e655b2e5c9a23e982c3e48fc191a18c50e65127c6b82b9746ea93a33246226cc59f058ab243de8e01518beb028a353b6e0197bbf633ef464b9a60ba95087237de33e655d578d4b1e50971ffdc4c65637cb65c6805dc5be11e1339c831ca12f6f574fae60c797377f90b1b02f34c55dc28dc52f5b992928b6830f3a40099b0d7bb7da37ce817c35454dafdde6fa0cd8982b0b71a6c8738666cdd79096f7bbf90aec48d3f77f3c60f4d097d03129f0dbf8bbb18d09a8f6c8191cc23c5c1ec85c998edd63af0102957203015dc5b2b9b8add927060e276893063d0123617600356d76d82137a80a7242b74597ef0f9b3542", @generic="4700b94170d5a0ae4e5a5a777a45898e7b330412db9b551de784b28d3b3f7d2e48eb4cb145a6337b429e543cebec2d8a8467ac2facf14ee1ff5e6f21061470addcb7", @generic="e9c1bc5046e4c88d46fb7b0e7252e3a1ef6624cd74b95ab5ce3ca4c4914cd2af09e16d3c754bebb0207fc926947ad11ce7d96f9942a12a2ebd7edd8066d22ea2115d5a7576ae3e9544b63674c1ad7e61352e5cca06415ec27fafc0010a68110344686e781dbff6b1cb3968703aa12887b5b045690af396aa5e25bd7e912471e37233f10635392826c00dcc832988c61c30b1b5d7b4826f4881b40f9bd492c0525c40d5bf628231ccaad97b60f0c5b3378fe749798ba8f168482a5cbe557d9f25c0a1520a304583565bfd8a0cab89d3f6e8e8d69a73a799a1158d67ba3e79406b09", @typed={0xc, 0x8b, @u64=0x80000000}, @typed={0xc, 0x6a, @str='aead\x00'}, @generic="f331364a82d95e37f9cea4fa641cd5a00a5d8fe5f0bc37ae4ec8968a076feba34702d866fa91eb8831400b81226d67cfe5feee52dd87568d10fa1533fb34a94def3fc6220d93fc686e831e162a02bd4fb244bbcf0d8318c9641faebf759ab3b512370840d8ad5229bf4101e40d178e5686619b6465333f74f7c11692bac636f9b309bb5233610a3962eefa0d868416c9a30295226326cb92fbb6ecf06965ac523e492c6af2bf72c1fe2623b88290170ad80e013a26cfcc3a1a5dd71c7f44d4772c810f207e403585b2ddb11c21dcfbb67170bd91d37bfb0b3e3e07e806320374a2f0b82444"]}, @nested={0x218, 0x62, [@typed={0x8, 0x13, @ipv4=@broadcast}, @generic="19b8966bded0e0226988995bc6e932a779b1aad8a528ab76cd399174937a693ce64164d51711dffe3d334b17af29945124063b73fe7fe357f64d7e4379c471bd3ac90dba19158b316a957bdb9279fc28a0b763e1d8fae08da7226b021d6f83f4cbf2e1d71d309c06771f5468e057ab1b2acee8ec9656019e2c0e4d66acdf8d7da5a99e6461068f4308a0db7e2b251740e0b84f4007159be32aec76033568206cd88eed57446cb45ff098d9d50a28406c23652a132bb373788935f801d1847dd6e3ba", @typed={0x8, 0x68, @u32=0x8}, @generic="8db9e5fcfee23154898833cb2f11036e9ab3006c99e3a4af9709b52332fe4bd46b30bac991d2a26efcf977d218c2db8e1410fc7d264983412695839b3c5da83e", @typed={0x48, 0x23, @binary="4d2f315d0437072778cbe94cc8d86ad6f7e9d567c6f3ededa90df9c7d5d7a7f2b1503e21b8de44b4b3698850a6a705843914d61b2c3c14d75d3a5bb254c526f898"}, @typed={0xc, 0x7e, @u64}, @generic="fbec137d58e7c882e17bc081f6345702b6a9ed362299ba8b34982f6798bdf9d698eceb0e9f13106e495ff5e22090f6688f253a4a3c15619d2f47dbbdf1bee8df71b9863696da4c3c0a8927846d73b0a33a29d6ffe2bd18e02562bbb451368722c0128662e3fa48e47f8ba880dda3f2b9868403785206c3b39906ba3565b694c296b9291f8af3b07da46e2f0607d5629cb1da1fefb5391883f912be3d942e6ebb75f83b", @typed={0x8, 0x21, @uid=r2}]}, @generic="7fe132bd99e8887a2044d3761536f1be6ef9f661909ac61e0cca3a7733d8cfb65e219b18a1f7d5ef84a811753608d7f0d4c3a8f2a83e5cc53bee21ece1ca094b28d4468f717f80fd64a1f5131d", @typed={0x8, 0x91, @pid=r3}, @generic="0cb80b17f026b51701739a09aa25d8adcd2a83d49160779c6b88e28c4eda029ff63a9710d583df5dc0064ef5ad522978b16a6da78f9fa4c1db91fae64500cecaaaaf372701e8c29e9d34024e902b0b815ea9eb0fceb121b8211dde9ec5e3", @generic="cbc934e9e421dbbac92ab72602ad774af5ea59ce1f9ee1ab6dc4f1464254e04d43366d8b47738d2f4040f3cf1e35ec175528f1039736efa0b5bd84905307e1694a1f6bd1790a"]}, 0x1770}, {&(0x7f0000001dc0)={0x127c, 0x13, 0x708, 0x70bd28, 0x25dfdbfc, "", [@typed={0x14, 0x5d, @ipv6=@empty}, @typed={0x14, 0x51, @ipv6=@mcast1}, @nested={0x1088, 0x59, [@typed={0x8, 0x15, @pid=r4}, @typed={0xc, 0x1a, @u64=0x40}, @generic="ed8d884fd55d34fc576a6cb3ef8113c021936897cdbb9b3b877125d762ec842b64df87e5269d9403eab3037849ece8cb44c73ae5035f00bcf26172053af1fa93e52d2886d3fbc4923ae71c67998856de48678e99a6bc743520ed5d303f1cf0a809e1f1ef411720", @generic="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", @typed={0x8, 0x7e, @u32=0x50000}]}, @nested={0xbc, 0x0, [@typed={0x8, 0x60, @uid=r5}, @generic="ede742e1da7bc2817906dab7f33ece251872a15ec7dde98e63725622ea897c1b71c2bf68d673e7849d2aebbdea7ea31918878a0ca7c389662faa9a45e6ede14ddaf3c6c5af3017083973b5ca891fd6c100bc35afd6b6928dd28b4a782efd729af8ab60109e9aadec51e479c63b07224701757c23970f5c34d1796f73ef9c1794ea90e7e921efd88efa3cbada5e3510c32d1672fec93872a19ca00fcffe6c3aa1aa119a79a97754bc", @typed={0x8, 0x0, @pid=r6}]}, @generic="6356c40ff15b0481b9e5ee57fc61a1d21cf918c4d9877441afa3bdc22ba7654358ef9b4a080ede063983b40895e68da3ba1b63626d40597c8190650486d5aa5c22afe72101e2bf0fdb050c03d443d0757f293af05b8a2bb39b6f3d927d220861c5cdfa29a10f56b9fc4441986c456106fff82388f05b74f7f651dae0757612ed26b6d3645011e4f81689d4ae80c79893fe929e525a0261cb38bc2edd8b53a4a5d339586bf4ec477fd461fb8e10752f51f4ee898683c6616e3d7291d7a3f331781184d34f0c826b0a8a8b5c7ba799eebdee3d93fe53fdcabaf7a587d7607bac988f7834e479c86b5191ce78fc27ce8fe1dd6e2b82cd76", @typed={0x8, 0x46, @uid=r7}]}, 0x127c}, {&(0x7f0000003040)={0x18, 0x34, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x4c, @u32=0x3}]}, 0x18}, {&(0x7f0000003140)={0x20, 0x2c, 0x300, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x16, @fd=r0}, @typed={0x8, 0x58, @uid=r8}]}, 0x20}], 0x5, &(0x7f0000003580)=[@rights={0x20, 0x1, 0x1, [0xffffffffffffff9c, r1, r0]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}], 0x80}, 0x8000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) 00:52:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x7}, [{}]}, 0x58) 00:52:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0505350, &(0x7f00000000c0)={0x107, @time={0x0, 0x1c9c380}, 0x0, {0xd21, 0x9041}, 0x0, 0x3}) write(r0, &(0x7f0000000140)="25e159676ed4efba11d4d0e1b096e3f2d778fe770ec47d33d4331d2477f6e0ac2d2aa3c56ae36a66e29e9ffeeb91a116d6dfdd58f504a3344985c412ab178f1ced3da9bd92c2d5c7dd5550e117604bab5db69c014823c7a5e425dbb6ae9505629686405cadbf9b2ce72bbd3526c9b6ddf44f86d73d41b88e6b9aa7822ac1cc12f32e153e311f7f79d9747dc1edf89c05f1eef78d8d2b39f6aaaab72318ffeefb7b394cad2f1318edda529f67972608a0e37a92e4094c622e739f45e1fd839cc1eeb55be1861d81d978cc29edbf3fb69669b979092ae264467555059a", 0xdc) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x200001) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="0400000000000000ea1c997b84c161d2a909a2393d3b5c1900008004002500ff0300008100000000000000c3062fc980f5a55374594e000000000a00000007000000ff030000f4060000030000000000000004000000ad0000000600000002e80000dfae7789b132f59f7441c81c11db7a0e3146279c00"]) fsync(r0) 00:52:30 executing program 5: syz_execute_func(&(0x7f0000000000)="47f7793d47dfd0f3430f1ac4c48281bcf5f245a541394ab38fc9280138c401c11201c401fa6fe967430f18490d") r0 = shmget$private(0x0, 0x400000, 0x54000600, &(0x7f0000bfd000/0x400000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10400, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) [ 2635.360584] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.365784] protocol 88fb is buggy, dev hsr_slave_1 00:52:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x58) [ 2635.440657] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.445817] protocol 88fb is buggy, dev hsr_slave_1 00:52:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2635.840604] protocol 88fb is buggy, dev hsr_slave_0 [ 2635.845778] protocol 88fb is buggy, dev hsr_slave_1 00:52:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) syz_open_dev$audion(0x0, 0x0, 0x200000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) socket$nl_route(0x10, 0x3, 0x0) 00:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xa}, [{}]}, 0x58) 00:52:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(r1, &(0x7f0000000000), 0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x100000001, 0x20, 0x1, 0x5}, &(0x7f0000000100)=0x18) bind$isdn_base(r0, &(0x7f0000000180)={0x22, 0x7, 0x1000, 0xfff, 0x800}, 0x6) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0x9f}, 0x8) ioctl(r1, 0x50800448d5, &(0x7f0000000000)) 00:52:31 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = getpgrp(0x0) perf_event_open(0x0, r2, 0x2, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) getegid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000080)=0x2) write$P9_RSTATu(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000140)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) 00:52:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x58) 00:52:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:31 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x4000, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x7, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$RTC_UIE_OFF(r0, 0x7004) syncfs(r0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffffffffff389, 0x401, 0x0], 0x3, 0x101, 0x4, 0x100000000, 0x6, 0x0, {0x8, 0x37f6, 0xfffffffffffffff9, 0x3, 0xfffffffffffffff8, 0x4, 0x6, 0xffff, 0x2, 0x9, 0xd18, 0x8529, 0x82, 0x7ff, "817c65fd78bf37db8436319d068bfe409c08dc7f633d08ea1ddc61c161aa0565"}}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB="021800001000000040000019000000000800123e870009000000004a10fc6d39498b80bc0000000000000000ef92000100000000000000265bac760700010000000000000000000000000000030006001602000002002398ffe27dad50747b22df792778000000800000000000000000000003000500da00000016000000b28dbebb10000000000000000000000057801ede67734ef785702e027c458fbd40e8072a1d9a9741b801ffa6dc7184e106a6f1b1dfa2bc36d717e4fbaf50ff8ac66ade3e59cb788b4bc01c55bd445967a3d2c0"], 0xd1}}, 0x20000000000000) r1 = socket$key(0xf, 0x3, 0x2) truncate(&(0x7f0000000040)='./file0\x00', 0x8) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 00:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe}, [{}]}, 0x58) [ 2636.640634] protocol 88fb is buggy, dev hsr_slave_0 [ 2636.645807] protocol 88fb is buggy, dev hsr_slave_1 00:52:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x58) [ 2636.715887] kauditd_printk_skb: 164 callbacks suppressed [ 2636.715902] audit: type=1400 audit(3151.926:78740): avc: denied { map } for pid=19439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.889238] audit: type=1400 audit(3151.986:78741): avc: denied { map } for pid=19439 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:32 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = getpgrp(0x0) perf_event_open(0x0, r2, 0x2, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) getegid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000080)=0x2) write$P9_RSTATu(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000140)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) 00:52:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2637.024641] bridge0: port 2(bridge_slave_1) entered disabled state [ 2637.031250] bridge0: port 1(bridge_slave_0) entered disabled state [ 2637.078693] audit: type=1400 audit(3151.996:78742): avc: denied { map } for pid=19442 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.222713] audit: type=1400 audit(3151.996:78743): avc: denied { map } for pid=19442 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.398866] audit: type=1400 audit(3152.016:78744): avc: denied { map } for pid=19439 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.570669] audit: type=1400 audit(3152.016:78745): avc: denied { map } for pid=19443 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.685281] audit: type=1400 audit(3152.036:78746): avc: denied { map } for pid=19439 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.770848] audit: type=1400 audit(3152.046:78747): avc: denied { map } for pid=19439 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.807801] audit: type=1400 audit(3152.056:78748): avc: denied { map } for pid=19443 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2637.846345] audit: type=1400 audit(3152.056:78749): avc: denied { map } for pid=19443 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2638.354424] bridge0: port 2(bridge_slave_1) entered blocking state [ 2638.361642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2638.368416] bridge0: port 1(bridge_slave_0) entered blocking state [ 2638.374927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2638.408095] device bridge0 entered promiscuous mode [ 2638.415519] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 00:52:33 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) fcntl$setflags(r0, 0x2, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5420, 0x0) 00:52:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x11}, [{}]}, 0x58) 00:52:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x58) 00:52:33 executing program 0: getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="6315741e07a1ad56ab01ae9d3b37ce0105e033638b71283bbd3b534b8a4bfc3e656198fb20432df13fccbed5cd030500dab5984652d698738c6a29a72361be3f418d50ea88332b5fffffff7ff2949e6f6a788c6e8d166e236d186d396812196148b95265d42e6d"], 0x0, 0x0, 0x2100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video36\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f00000000c0)=0x3) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000380)=""/158) 00:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:33 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r2 = getpgrp(0x0) perf_event_open(0x0, r2, 0x2, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) getegid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000080)=0x2) write$P9_RSTATu(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000140)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) 00:52:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x21}, [{}]}, 0x58) 00:52:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}]}, 0x58) 00:52:34 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="c3"], 0x1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:52:34 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) inotify_init() socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e23, 0x8, @loopback, 0xd5}, {0xa, 0x4e20, 0x6, @loopback}, 0x2f8d, [0xfffffffffffffffc, 0x2, 0x7, 0x5, 0x7, 0x4, 0x2, 0x2]}, 0x5c) socket$inet_dccp(0x2, 0x6, 0x0) syz_execute_func(&(0x7f0000000180)="1c17b5b598cd80f56962f5696200d9460f2df017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 00:52:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2639.360629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:52:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write(r0, &(0x7f0000000040)="2094daf6f35b60b1f455e1cd04d0e179dd9214431b2e31c0d95f9e5310d6c69bed", 0x21) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x52a852746b84f07a) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x200, 0x7fff, 0x4, r2}, &(0x7f0000000180)=0x10) r3 = add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="dc5b5369195a8cdb92ad5d1530e9c5744e64d8e4cf687ece29479cba848c49d41e1e1f4d83d6e8af21dab894f48e8698a317d8cebbb12ec6497223c4d0cbf9b51bb753b06067", 0x46, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000002c0)={r3, 0x0, 0x7ff}, 0x0, &(0x7f0000000340)="add79417251d9ad23566f4cd75d450071bd30c442901171f848b4774e5a8193c5aa520e10f83d51094cb3d09c58fbccd0b1266bb58343b68b3effa5f0eb72dcc36c0b480dd9ff2668d75b2282320ef9633a463a6daf659d08579726249e724e982fa5518ea95d835f87b676e7a040dc32d753f0c02457d7ddfcca2aa5c64564addcfa419", &(0x7f0000000400)="c5d2d7d63156911f52e98b5a9519e6aadd29d516a50ba909ead28c3cf3ed81cc36bd8e4dfb39ff36f9f47974de3e2f395168b40e88e4ea31b01c94200cf2772fead1beabbce49e41a10f7355ca8d3ac8529d1b033413f299463c5f688563fa83ed14d3bb4d4900f3864e2691232f6b9b30c64da98abc0e907fe32ac36b8fe2277d9ab2e188c4c6c2ceffa9fd3feb223eb0492d1ff194574cc7c30c627c0f39a7a5dae81156b9db814dce9cf13e4d78b47b6b35ace9507b076c579fc3bd086e3d0f7f292412") ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x36, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000280000000000009078ac141400ac1423bb00000000000000000000000000000000000000001f4e3ce4f4895528643c80f1beeb88cffb8d8bb1d2b9d2f23857b160a584e8a183b27e89ec0cde2a123c734ba6390dc4eca201ec37855258b1ab8ec4f9fbc84096a64cb4684599ad4e83aa64ba346cf681a3c4c2d4dce66467e020224e978e52"], 0x0) 00:52:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}]}, 0x58) 00:52:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2f}, [{}]}, 0x58) 00:52:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffbd, 0x0, 0x0, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xe4, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000080)="2463d9a0f144e6409e4dd2eea537e648", 0x10) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCCONS(r3, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0xa0000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f00000000c0)={0x3, [0x0, 0x5, 0x8]}) 00:52:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x32}, [{}]}, 0x58) 00:52:35 executing program 0: r0 = open(&(0x7f0000000400)='./file0\x00', 0x400000, 0x0) r1 = socket$key(0xf, 0x3, 0x2) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x5f2e}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x232) r4 = dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/230, &(0x7f00000003c0)=0xe6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x5, 0x8, 0x3e23, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x26}, 0xffffffff}}, 0x800d, 0x3, 0xfffffffffffffffd, 0x5, 0x7}, &(0x7f0000000240)=0x98) socket$isdn_base(0x22, 0x3, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x17, &(0x7f0000000280)=0x800, 0x4) sendto$inet6(r2, &(0x7f0000000140)="ca2a07000000000000001470ba6cd7ed8d3c69894c4fc4b74da30defc97cf68b", 0x20, 0x0, 0x0, 0x0) [ 2640.000587] net_ratelimit: 20 callbacks suppressed [ 2640.000597] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.010953] protocol 88fb is buggy, dev hsr_slave_1 00:52:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}]}, 0x58) 00:52:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x33}, [{}]}, 0x58) [ 2640.801438] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.807701] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.814933] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.821345] protocol 88fb is buggy, dev hsr_slave_1 00:52:36 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/7, &(0x7f0000000080)=0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$unix(0x1, 0x7, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) sendto(r1, &(0x7f00000000c0)="6c235b351b8aa67b02e95445efaddf0871bf55df4ffba7f776a2e891d1a728fd1a2c5ffb62284f6d24c0c0ce40398bb585430a59c8d95c433749c51abf02a75486d400967ad30f4ddd77926f2859f9354ff0874e7cc8ab3624a22ea4da747578db9d61faeeb21f8e725f0ea198ed2ece0b5975d788342fe0f2e6503fb18d3c7cfb15270bbb01cfe66235380ce36fc44a57e31517e391a1c8e45d75d23b8757e0ad08539668244156810cdb2597819b7da59a642415affd3f0529aed6f0222fc2f3cc0f61887d3318eeaec22c1d1c2b6af16df92875", 0xd5, 0x800, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001000000ec00000004000000"], 0x18}, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000)=0x2, 0x4) close(r2) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xffffffffffffffff, 0x20001) r4 = request_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='/dev/media#\x00', 0xfffffffffffffffe) r5 = request_key(&(0x7f0000000300)='rxrpc\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='cgroup\x00', 0x0) keyctl$link(0x8, r4, r5) ioctl$RTC_PIE_OFF(r3, 0x7006) 00:52:36 executing program 0: r0 = userfaultfd(0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xf4dc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000911000)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1}) clone(0x84000000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x3c) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x2}) [ 2641.040587] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.045751] protocol 88fb is buggy, dev hsr_slave_1 00:52:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f00000000c0)=0x60000000000000) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000a0000001f000000000a08000800030002000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:52:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x58) 00:52:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000400000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60}, [{}]}, 0x58) [ 2641.600647] protocol 88fb is buggy, dev hsr_slave_0 [ 2641.605815] protocol 88fb is buggy, dev hsr_slave_1 [ 2641.729227] kauditd_printk_skb: 168 callbacks suppressed [ 2641.729245] audit: type=1400 audit(3156.936:78918): avc: denied { map } for pid=19573 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2641.864912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2641.956258] audit: type=1400 audit(3156.956:78919): avc: denied { map } for pid=19574 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}]}, 0x58) 00:52:37 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x8) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000180)={0x40, @bt={0x1000000, 0x10}}) [ 2642.116957] audit: type=1400 audit(3156.976:78920): avc: denied { map } for pid=19573 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x5, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000550a000000020000630100babd0000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x83, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000300)={{0x200, 0x7, 0xb91d, 0x1000, 0x0, 0x4}, 0x4}) [ 2642.293470] audit: type=1400 audit(3157.016:78921): avc: denied { map } for pid=19574 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6c}, [{}]}, 0x58) 00:52:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) chroot(&(0x7f0000000340)='./file0\x00') rmdir(&(0x7f0000000040)='./file0\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup2(r2, r0) ioctl$SIOCNRDECOBS(r3, 0x89e2) [ 2642.504260] audit: type=1400 audit(3157.026:78922): avc: denied { map } for pid=19570 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x8) recvfrom$unix(r0, &(0x7f00000007c0)=""/233, 0x24b, 0x20, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) sendto$inet(r1, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240), 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) accept4(r1, &(0x7f00000001c0)=@l2, &(0x7f0000000080)=0x80, 0x7ff) accept4(r1, &(0x7f0000000140)=@can, &(0x7f00000002c0)=0x80, 0x800) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000380)) getpid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00000000c0)='H', 0x1, 0x5, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000100)="91", 0x1, 0x8000, 0x0, 0x0) shutdown(r1, 0x2) recvfrom$inet(r1, 0x0, 0x0, 0x80040000101, 0x0, 0x2f49b2819fbc7c26) 00:52:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}]}, 0x58) 00:52:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2642.656352] audit: type=1400 audit(3157.036:78923): avc: denied { map } for pid=19570 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:37 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x11, 0x1, 0x800) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101200, 0x0) [ 2642.860830] audit: type=1400 audit(3157.036:78924): avc: denied { map } for pid=19573 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.059819] audit: type=1400 audit(3157.036:78925): avc: denied { map } for pid=19573 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2643.257551] audit: type=1400 audit(3157.076:78926): avc: denied { map } for pid=19573 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe0}, [{}]}, 0x58) 00:52:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) r3 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x9, 0x3be5ebb13a9b700c) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0xd, 0xffff, 0x3, 0xfffffffffffffe01, 0x5, r1, 0x80000001, [], r2, r3, 0x7, 0x2}, 0x3c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x4000000001) ioctl$VT_ACTIVATE(r0, 0x8926, 0x715000) [ 2643.449451] audit: type=1400 audit(3157.156:78927): avc: denied { map } for pid=19588 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x58) 00:52:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x7fffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x7, 0x100}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[], 0x7000, 0xfffffffffffffffd}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:52:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x346}, [{}]}, 0x58) 00:52:39 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000280)="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", 0x1000, 0x4, &(0x7f0000000180)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$inet(0x10, 0x3, 0x200000000a) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x608082) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000140)) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000100007031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x1000, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={r3, 0x2}, 0x8) 00:52:39 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c121f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1ffffffffffffe, 0x0, @mcast2, 0x7}, 0x3ec) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0xff, @rand_addr=0x9, 0x4e20, 0x2, 'wlc\x00', 0x1d, 0x0, 0x19}, 0x2c) 00:52:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x58) 00:52:39 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x4ea2d194cac00936) lseek(r0, 0x2000000000004, 0x0) 00:52:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000001000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x347}, [{}]}, 0x58) 00:52:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x58) 00:52:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, &(0x7f0000000100)=""/86}) 00:52:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2645.200634] net_ratelimit: 20 callbacks suppressed [ 2645.200643] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.210833] protocol 88fb is buggy, dev hsr_slave_1 00:52:40 executing program 5: r0 = socket$kcm(0xa, 0x0, 0x73) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect(r0, 0x0, 0x24c) syz_emit_ethernet(0xc0, &(0x7f0000000240)={@broadcast, @random="029cce98941b", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x29c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff80, 0x0, 0x0, 0x0, [0x14, 0x0, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3201]}}}}}}}}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40000, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x6) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='io.bfq.weight\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x400000000000007f) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r5, 0x200}}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x10000, 0x3, 0x1, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) 00:52:40 executing program 2: r0 = socket(0xa, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000280)="48000d001400197f09004b0101048c590a88ffffff010001000000000028213ee206002d905c84db77d4ff5bffff00c7e6ed5e00010000000000000000eaf60d18125d4b18857a9e", 0x29033dc27eceafdc}], 0x1) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:52:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x500}, [{}]}, 0x58) 00:52:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x58) 00:52:40 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x801, 0x3) bind$bt_l2cap(r1, &(0x7f0000000040), 0xe) listen(r1, 0x0) r2 = dup2(r1, r0) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000000)={0xfffffffffffffff9, 0x0, 0x10001, 0xfffffffffffffff8}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000080)={r3, 0x80000000}) 00:52:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2645.760653] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.766016] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.840590] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.846005] protocol 88fb is buggy, dev hsr_slave_1 00:52:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x600}, [{}]}, 0x58) 00:52:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}]}, 0x58) 00:52:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000002c0)={0xff, 0x3ff, 0x648, 0x0, [], [], [], 0xdefe, 0x1, 0x10000, 0x5, "0a47f93e66acc4d13379734b64595c11"}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x44) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000001000000e802230000000000000081001c00000000009a1948e4c8cad4e9f3976e536b9a78699fd8938d39ecda7d0cdea25ccaa4e9d28bb43a6dc286de02ccb3d42ae3e77d15c598175ff5628daeb237d0e86981ad50b873c44cac4069cb14eb99f2bd423893b86da66434d4c0b9bf814516603b12f1dbaf6499"], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) setsockopt$inet_tcp_int(r3, 0x6, 0x3f, &(0x7f0000000080)=0x100000001, 0x4) [ 2646.240588] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.245879] protocol 88fb is buggy, dev hsr_slave_1 00:52:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000006000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:41 executing program 0: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x10001, 0x5, "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", 0xc, 0x7, 0x0, 0x6, 0x8, 0xf5f2, 0x1, 0x1}, r2}}, 0x120) r3 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8, 0x3f, 0x7}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000840)={[{0x4, 0xfffffffffffffe00, 0x200, 0xfffffffffffffe00, 0xffff, 0xffffffffffffffff, 0x8387, 0x6, 0x8001, 0x6, 0xfd, 0xaf, 0x800}, {0x100000001, 0x6, 0x2, 0x3, 0x1, 0x1, 0x1, 0x8, 0x3ff, 0xa0, 0x2, 0x7}, {0x1ff, 0x7ff, 0x4, 0x81, 0xa8, 0xffffffffffffff81, 0x2, 0xb8, 0x40, 0x5, 0x7, 0x6, 0x7fffffff}], 0x4}) setsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000680)=0x3f, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getpid() ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f00000006c0)={0x2, 0x9}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000640)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ptrace$getregset(0x4204, r0, 0x200, &(0x7f0000000040)={0x0, 0xfffffffffffffdd0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)=0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r4, @ANYBLOB="020001fe2e0ae7372991ba2c0197b4434d3508e6a14d339316ded574f9735497c6f9fb16c8ce01783a36a1e5c25722ee60f07a2cef75480791234f89f86c042cfe40bfd1f51c2a1976d637d96764a422f387c6b09f3393f18d2de30a6345741526f4a3a056cf6fb18ebe7a2d0e7ebce629a8781482e51caa64e109d5ed928a3de7cefd4127824201586bb3b24ed1e98a8c", @ANYRES32=r5, @ANYBLOB="040007000000000008000700", @ANYRES32=r6, @ANYBLOB="10000400000000002000020000000000"], 0x3c, 0x0) 00:52:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}]}, 0x58) [ 2646.748801] kauditd_printk_skb: 195 callbacks suppressed [ 2646.748817] audit: type=1400 audit(3161.946:79123): avc: denied { prog_load } for pid=19738 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:52:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x700}, [{}]}, 0x58) [ 2646.894115] audit: type=1400 audit(3162.006:79124): avc: denied { map } for pid=19746 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2647.040586] protocol 88fb is buggy, dev hsr_slave_0 [ 2647.045768] protocol 88fb is buggy, dev hsr_slave_1 [ 2647.081807] audit: type=1400 audit(3162.026:79125): avc: denied { map } for pid=19743 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2647.208775] audit: type=1400 audit(3162.026:79126): avc: denied { map } for pid=19746 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2647.327482] audit: type=1400 audit(3162.036:79127): avc: denied { map } for pid=19743 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:42 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000000)=""/28, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x1, 0x0, &(0x7f0000000140)=""/118, 0x0}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4c80a12}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x2, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x80000001}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x80) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000200)=&(0x7f00000001c0)) fcntl$setflags(r0, 0x2, 0x1) 00:52:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}]}, 0x58) 00:52:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x9, @raw_data="d046fee457ca8faf7a0370dd46f70d96fbecf5b1d849b55b7b61c0d222aeeba8bcc97ebb3b6e2963261f808430396bb69d178e075f1563f1e84db70c6c67924d91eb2ead96a53b2c4675e343d497a4ad649fd2207999bd632919fcf8c21e47138e03164ecb3ef7587f72a05e29dab222e5b44cfd4ed3edb53d6f51fdde3f89bb7432130dc414251e57e161f495ce8e55f8f8fa46ab159dc366d9bb50bc26e2ab299f3ba6a89bdabf08cd2065b6f10c1b965c9f54f520a64382618050b0dea165c360ed34755ee78d"}) 00:52:42 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x402, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000100)={0xa, @raw_data="efbfcf70bb462fbaae45dabae64d40c18d89831a99152b7934a54cb73e2afef01c59477473cb35f5e8384627e7b1768e1bef9f3e76798ad9edf2cc5da4821f08a39e5ffc632b987ddf77e7c83f3d2f3e869c1b8725104b8f2a6f6c46a7c963be3e3c4e73fe4bf4c727bc43acafbfdffaba04d55f0b1d617d6f89173af30ef417b83f99082b8e0ca58cd74d1f0912e0c542b8273e5e38e64a6005bf5138a4c9be5de493d3bc7f9ae1d1cfef23bf2e7394542a884b12b19094a2885560923aa4f809552174f7a2e377"}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x180) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x5c, @multicast1, 0x4e23, 0x0, 'wlc\x00', 0x16, 0x4, 0x6f}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x0, 0x81, 0x9, 0xf89}}, 0x44) [ 2647.480929] audit: type=1400 audit(3162.046:79128): avc: denied { map } for pid=19746 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000000)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x13) open(&(0x7f0000000300)='./file0\x00', 0x40, 0x20) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000001c0)) 00:52:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xa00}, [{}]}, 0x58) [ 2647.608957] audit: type=1400 audit(3162.046:79129): avc: denied { map } for pid=19743 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x5, 0x8, 0x4}}, 0x28) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28}, 0x28) 00:52:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}]}, 0x58) [ 2647.801050] audit: type=1400 audit(3162.056:79130): avc: denied { map } for pid=19743 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) sendto$rose(r1, &(0x7f00000000c0)="9273f7aa98cc48d7f2c1d409e56b24d25ce454352af9006ac50359deefdd229f1161804f2a968b5ac168328b873a794e25c7705bb927883b12d8fe75ce0b0016279f77c6cb75d2afcecd", 0x4a, 0x14, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000240)={{0x33, @empty, 0x4e23, 0x4, 'dh\x00', 0x12, 0x3, 0x13}, {@remote, 0x4e24, 0x10003, 0x1, 0x7fffffff, 0xcb0d}}, 0x44) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) syz_open_dev$usb(0x0, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r0, r3, 0x0, 0x102000004) [ 2647.990651] audit: type=1400 audit(3162.076:79131): avc: denied { map } for pid=19746 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2648.133765] audit: type=1400 audit(3162.076:79132): avc: denied { map } for pid=19746 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe00}, [{}]}, 0x58) 00:52:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:44 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x1) getsockname(r0, 0x0, &(0x7f0000000080)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4300, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x7fff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, [0x4, 0x5, 0x7, 0x9c00000000000, 0x9, 0x49d7fcdc, 0x7ff, 0x4, 0x6, 0x800, 0x3, 0x3, 0x9, 0xb30, 0x6]}, &(0x7f0000000200)=0x100) 00:52:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x58) 00:52:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x600b, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f300032f5000072e1513f73720e95e06c8ed4d3664c4221d7b1deca24bb0ea35edc09341993bbfd7624a0f895de76b681e0b6582bd8475ba1439cd55e04e912340e499af5418f00fa3136f40f90"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) 00:52:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1100}, [{}]}, 0x58) 00:52:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x3c, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x7}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000000000)=0x1000) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0xfffffffffffffffd, 0x2012, r1, 0x0) 00:52:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x7fff, @empty, 0x1ff}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x2b}}, @in6={0xa, 0x4e22, 0x800, @ipv4={[], [], @local}, 0x8001}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x10001, @mcast1, 0x2}], 0xa0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18000001}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@flushpolicy={0x10, 0x1d, 0x300, 0x70bd25, 0x25dfdbfe}, 0x10}}, 0x40040) syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_tables_targets\x00') 00:52:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}]}, 0x58) 00:52:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000140)={0x3348, {{0x2, 0x4e24, @multicast2}}}, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000100), 0x0}, 0x18) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), 0x4) 00:52:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2100}, [{}]}, 0x58) 00:52:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:45 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0405519, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x2002) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0xf, 0x3}, 0x10) 00:52:45 executing program 0: unshare(0x400) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) fallocate(r0, 0x38, 0x3ff, 0x5) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x302}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e20, 0x8, @mcast2, 0x3}}}, 0x84) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x8}}, 0x14) mq_getsetattr(r0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000200)=""/77, 0x4d, 0x100, &(0x7f0000000280)={0x2, 0x4e20, @local}, 0x10) 00:52:45 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000340)=0x8001, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000240)) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f00000000c0)={@remote, r3}, 0x14) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$PPPIOCSCOMPRESS(r1, 0x40107446) 00:52:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401}]}, 0x58) 00:52:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2f00}, [{}]}, 0x58) [ 2650.400627] net_ratelimit: 20 callbacks suppressed [ 2650.400646] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.411110] protocol 88fb is buggy, dev hsr_slave_1 00:52:45 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) openat$userio(0xffffffffffffff9c, 0x0, 0x400105, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x3a2, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, 0x0) r1 = inotify_init1(0x80000) r2 = dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) 00:52:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480}]}, 0x58) 00:52:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x1) write$P9_RFSYNC(r1, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380), 0x8}) 00:52:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000050000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:46 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) close(0xffffffffffffffff) pipe(&(0x7f0000000340)) vmsplice(r0, &(0x7f0000000040)=[{0x0, 0x81d3}], 0x1, 0x0) sendto(r0, &(0x7f0000000080)="aed9751aa44ae1f25b0c87fadba37fed6c24957f121aebab16f9f3f8c7a1b49acb60442f5a60e021e220bbc91e4abf0d5f88f9b12532193aca448bdbd10b0ddcf762ebd2849647350be780546a510e97bf4e7bdeba4fd12ad49249b47b0a55c565ebbf9dbdd8b6395397615b202f3f0f53de8daa4a59f9af413f454e821430d317dc59afff35a73804b715316269215d974774fa135f6cde741913b4b785", 0x9e, 0x91, &(0x7f0000000140)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x4, @rand_addr="c630f7a8be25c7db084770655000173a", 0x5}}, 0x80) 00:52:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3200}, [{}]}, 0x58) [ 2651.200618] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.205839] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.211158] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.216297] protocol 88fb is buggy, dev hsr_slave_1 00:52:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(xchacha12-generic)\x00'}, 0xfffffffffffffd13) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000fc0)={0x0, {{0xa, 0x0, 0x0, @loopback, 0x1}}}, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000340)=""/197, 0xc5}, {0x0}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=""/76, 0x4c}}, {{&(0x7f0000000700)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000840)=""/247, 0xf7}, {0x0}, {0x0}, {&(0x7f0000000b40)=""/46, 0x2e}, {&(0x7f00000013c0)=""/223, 0xdf}], 0x5, &(0x7f0000000f40)=""/88, 0x58}, 0xffff}, {{0x0, 0x0, &(0x7f0000001cc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001d00)=""/229, 0xe5}}, {{&(0x7f0000001e00)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, 0x0}, 0x4}], 0x4, 0x40000000, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:52:46 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000000200)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x3c1, &(0x7f0000c22fa0)=[{&(0x7f00000001c0)=""/1, 0x1}], 0x1, 0x0) close(r0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f00003ef000/0x2000)=nil], &(0x7f0000000040)=[0x774, 0x8000], &(0x7f00000000c0)=[0x0, 0x0], 0x4) 00:52:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}]}, 0x58) 00:52:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2651.440635] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.445851] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.778157] kauditd_printk_skb: 203 callbacks suppressed [ 2651.778174] audit: type=1400 audit(3166.966:79336): avc: denied { map } for pid=19913 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:47 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0xa040, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=r1, @ANYBLOB="04002dbd7000fedbdf2511004e210000080003000000000008000800ec00000008000511000000002400020008000500ff0f00000800030003000000080002004e21000008000300040000000c000100080001000a00000008000500090000000c00010008000600735900000800050001000000"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x14e24}, 0x1c) recvmmsg(r2, &(0x7f0000000200), 0x2ab, 0x0, 0x0) r3 = fcntl$getown(r2, 0x9) sched_setattr(r3, &(0x7f0000000080)={0x30, 0x5, 0x1, 0xe1e6, 0x0, 0xffffffffffffff00, 0x2, 0x4}, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) setsockopt$llc_int(r0, 0x10c, 0xb, &(0x7f0000000240)=0x8000, 0x4) 00:52:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3300}, [{}]}, 0x58) [ 2651.984534] audit: type=1400 audit(3166.996:79337): avc: denied { map } for pid=19911 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2652.010610] protocol 88fb is buggy, dev hsr_slave_0 [ 2652.015938] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.168403] audit: type=1400 audit(3167.046:79338): avc: denied { map } for pid=19913 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:47 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x1, 0x0, [0x0]}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0xc00, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xdb, 0x212803) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x44, r3, 0x408, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20048800) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000240)={&(0x7f0000000200)=[0xffffffff], 0x1, 0x0, 0x5f5, 0x2, 0x529, 0xe6b, {0x10000, 0x40, 0xfff, 0x8, 0x4, 0x5, 0x3, 0x5, 0x6, 0x6, 0x9, 0x7, 0x401, 0x80000001, "89a849f62dddd66317dab54c8e76da07560015db9fbe6096d6cc9fc38ab3fdfe"}}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000080)=[0x5, 0x8, 0xfffffffffffffffa], 0x3, 0x3, 0xfffffffffffffffe, 0x6, 0x740010b4, 0xffff, {0xfffffffffffffffd, 0x9, 0x1, 0x26c8, 0x5, 0x8001, 0x8, 0x7244, 0x3bd, 0x9, 0x10001, 0xb69, 0x6, 0x2, "fe8d061b200d87ed737483af043bb4b0625a72b1c2facff75cd38a69f4d9a25b"}}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r6, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd111}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1e22000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4001}, 0x40001) 00:52:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000003460000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2652.368204] audit: type=1400 audit(3167.076:79339): avc: denied { map } for pid=19911 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}]}, 0x58) [ 2652.511909] audit: type=1400 audit(3167.076:79340): avc: denied { map } for pid=19911 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2652.690604] audit: type=1400 audit(3167.126:79341): avc: denied { map } for pid=19913 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4603}, [{}]}, 0x58) [ 2652.849909] audit: type=1400 audit(3167.136:79342): avc: denied { map } for pid=19911 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.034262] audit: type=1400 audit(3167.166:79343): avc: denied { map } for pid=19913 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x40000076, 0x0, 0x1b], [0xc1]}) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0xffffffffffffe066, 0xfffffffffffffff7, 0x48, 0x4]}) 00:52:48 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) connect(r0, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x4, {0xa, 0x4e22, 0x3, @local, 0x3}}}, 0x80) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x400, 0x4) [ 2653.194371] audit: type=1400 audit(3167.166:79344): avc: denied { map } for pid=19913 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b}]}, 0x58) 00:52:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2653.393554] audit: type=1400 audit(3167.166:79345): avc: denied { map } for pid=19913 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4703}, [{}]}, 0x58) 00:52:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000300)) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/247) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) r0 = socket(0xf, 0x8000a, 0x101) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@rand_addr="0add10cf66895278f7fe4842f0edd9fe", 0x200, 0x2, 0x1, 0x0, 0x26, 0x1f}, &(0x7f00000001c0)=0x20) 00:52:49 executing program 2: getpid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) 00:52:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8, 0x81, 0x8}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x7, 0x7, 0x100000001}, 0x10) r3 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x1, 0x10000) r4 = dup(r3) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000040)=0xa8, &(0x7f0000000080)=0x2) write$binfmt_elf64(r3, &(0x7f0000000300)=ANY=[], 0xf6) ioctl$SG_GET_REQUEST_TABLE(r4, 0x227c, 0x0) ioctl$RTC_PIE_ON(r4, 0x7005) 00:52:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x58) 00:52:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6000}, [{}]}, 0x58) 00:52:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:49 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video2\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) unshare(0x8000400) r3 = mq_open(&(0x7f0000000080)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x71a}) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000380)={0xa1, 0xb, 0x4, 0x0, {r1, r2/1000+10000}, {0x3, 0x2, 0x12441976, 0x1f, 0x3, 0x7ff, "21bac660"}, 0x200000, 0x3, @offset=0x6, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'nlmon0\x00', @broadcast}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000400)={{0xffffffffffff0001, 0x0, 0x100000001, 0x5, 0x9, 0xffffffffffffffff}, 0x3, 0x2, 0x9}) 00:52:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x58) 00:52:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6c00}, [{}]}, 0x58) 00:52:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:50 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uinput\x00', 0x6, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900)='/dev/hwrng\x00', 0x280100, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000500)='./file0\x00', 0x1461, 0x3, &(0x7f0000000740)=[{&(0x7f00000005c0)="7cf6b8582d7b6d7878d8b0292857dd1f75f497f7a2f29a4ff83cf73e713ecb51dcfc3de9840b890a222fd1296bded829d1e2a107913ba7669c43156bce43872e7e980091c0f4395185947df957661159762fca1544d51517c65daa313a536214e920b0adb04e9cee58a95ca03a33495b508b5b32a317cacca8b46066a52a2bf254fc91f4f8ffe6406b76c5336c8aa6feb63d13e8f136891cca07244631393873269a1309d7e013e3de9288c553e66698c9feb0658f", 0xb5, 0xb4}, {&(0x7f0000000540)="c891", 0x2, 0xfffffffffffff421}, {&(0x7f0000000680)="bb893423a6ae1fd9b0e2c942c152e259d9250c3f413a2204f4d5d0fe179de694c2a0f53f7da509a2bfd953290ddb18de2700d3f927bf38bdbdd43fe994617dd23d132d811180c5e1925213e51eb97d854e0126f1d1922801b245ad3f6d5d7a8236f76d736a376d9107738c9c23578de0e97b1aeb172971c90da44e61ee749f52ceba3211da8cb4b216a1723cd57680d18ac1bb19eeb5d1f4dd84e4e4a766ff03c054e9ebb6fcb9539af4f6e1cfc6", 0xae, 0x10}], 0x1, &(0x7f0000000880)={[{@user_xattr='user_xattr'}, {@noacl='noacl'}, {@jqfmt_vfsold='jqfmt=vfsold'}], [{@uid_lt={'uid<', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz0\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/uinput\x00'}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}]}) 00:52:50 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upgerdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000180)='./file1\x00') [ 2655.501819] input: syz0 as /devices/virtual/input/input52 [ 2655.600602] net_ratelimit: 20 callbacks suppressed [ 2655.600612] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.610953] protocol 88fb is buggy, dev hsr_slave_1 00:52:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x58) 00:52:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe000}, [{}]}, 0x58) 00:52:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000100)=@dstopts, 0x8) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000140), 0x4) getsockopt$inet6_opts(r2, 0x29, 0x36, 0x0, &(0x7f00000002c0)) write$UHID_INPUT(r2, 0x0, 0x0) 00:52:51 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x80000, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000080)='system\x00', 0x7, 0x3) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e22, @multicast2}, {0x307, @remote}, 0x30, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'rose0\x00'}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x6, @local, 0x9}}, 0x7, 0x3, 0x101, 0xffffffff, 0x8}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={r2, 0xfffffffffffffffa}, &(0x7f00000002c0)=0x8) r4 = openat$random(0xffffffffffffff9c, 0xfffffffffffffffd, 0x50000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000300)={0xfffffffffffffff8}) r5 = syz_open_dev$usb(&(0x7f0000000340)='/dev/bus/usb/00#/00#\x00', 0x6, 0x101000) setitimer(0x1, &(0x7f0000000380)={{0x0, 0x7530}}, &(0x7f00000003c0)) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000400)=0x1, 0x4) fsync(r5) clock_getres(0x7, &(0x7f0000000440)) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x20000, 0x21) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x4, 0x80000001, 0x8, 0x0, 0x8}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000005c0)={r7, @in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xd9}}, 0x3}, 0x90) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000700)={0x7ff, 0xffffffff, 0x71, &(0x7f0000000680)="afaadbc0a59da1d13c964a7c9483567779f3638ee11436553f48c6491e34ceb9614977f42de488a38cdfbde8ce7ea43437a71095d454fa5f7c3ba694ffbe0934f7241bb161aa64eea1cb03c6d1520e79c2d5646b9cbaf81ac2ecbf4641999315b22d6f9a1169edff40a61ad60cb38eb81a"}) r8 = getuid() fstat(r5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r5, &(0x7f00000007c0)={0xa0, 0x19, 0x2, {0x2, {0x0, 0x0, 0x6}, 0xb0, r8, r10, 0x2a, 0x4, 0x7fff, 0x0, 0x4, 0x5, 0x3, 0x6, 0x100, 0x4, 0x6, 0x133a123c, 0x4, 0x2, 0x3}}, 0xa0) r11 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r11, 0x8904, &(0x7f00000019c0)=0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000001a00)={0x0}, &(0x7f0000001a40)=0xc) r14 = getpid() r15 = getpgid(0xffffffffffffffff) r16 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004940)={0x0, r5, 0x0, 0x7, &(0x7f0000004900)='%^eth0\x00', 0xffffffffffffffff}, 0x30) r18 = getpgrp(0x0) fcntl$getownex(r11, 0x10, &(0x7f0000004980)={0x0, 0x0}) r20 = fcntl$getown(r1, 0x9) r21 = getpgrp(0x0) r22 = gettid() ioctl$sock_FIOGETOWN(r11, 0x8903, &(0x7f0000004c40)=0x0) ioctl$TIOCGSID(r11, 0x5429, &(0x7f0000004c80)=0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000004cc0)=0x0) fcntl$getownex(r6, 0x10, &(0x7f0000005ec0)={0x0, 0x0}) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000005f00)=0x0) r28 = getpid() sendmmsg$unix(r5, &(0x7f0000006080)=[{&(0x7f00000008c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001980)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="e5", 0x1}], 0x2, &(0x7f0000001a80)=[@rights={0x20, 0x1, 0x1, [r4, r6, r6, r11]}, @cred={0x20, 0x1, 0x2, r12, r9, r10}, @cred={0x20, 0x1, 0x2, r13, r9, r10}, @rights={0x20, 0x1, 0x1, [r11, r1, r6]}, @rights={0x18, 0x1, 0x1, [r6]}, @cred={0x20, 0x1, 0x2, r14, r8, r10}, @rights={0x30, 0x1, 0x1, [r6, r6, r0, r11, r11, r0, r4, r4]}, @rights={0x28, 0x1, 0x1, [r5, r11, r11, r0, r6, r11]}], 0x110, 0x4080}, {&(0x7f0000001bc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001c40)="d2d06068c20072fe1df51da828002186153ddbb6fdd0b73633054e4cd3b1f04907cd75a28c283f88ee30598c8adb7cd8a1b931de0c1ee129eb89c7c33e4638679c1514bc01e5b4f9caf3fce7dd", 0x4d}, {&(0x7f0000001cc0)="ff2021ce6dd3dc893807bbb00d5c3c30506b3b8091b727217f1d447bf6cc0bb6d43ef45131fa289caf1c", 0x2a}, {&(0x7f0000001d00)="da04bfb9f34b36399d1639bc5cde874ba86edf53f99f00967753d72c5234788e61e41c6e0ca298cc48f81bce32da9d0cfb8f791dc8c42c4436d761090b39f3dbf6fdbfd8bbc84bf4d12e40f9363547cca8099945c141262759137caab5561479ad823ef1594bd3633687ca86a455df00be8afe54a568a926d27f41825496124e244668719d014c5156994450b63d99df9f69a502a7dbc9854a856c268c9b33fc20a7925ef50ead15b9a4190a7f", 0xad}, {&(0x7f0000001dc0)="9399c39f05ca4ee7ce30272612ad384e88ed516e3a0b5d8dcd6469c2b51b38a11217219e54660caeee7f51d9b87edabb9d5ad67125e7ca56c707c0a442191c5657a7d110dcb2e4295a", 0x49}, {&(0x7f0000001e40)="b9dd78ea439b016b3499501ee87c16c9c3ef301572b8888a654f9bcde4075e97327234ef4571aa66afef70334f4e3e6d4c10c84b4e493717143afbe42e0f2463f5a29cc076d9632eac3293369ff8c0c14995211683127371ea1bfc382568deffb95543a78c0def46b498aa54e774f2ead751e931eab9d4bf442df0d7425610e366bb1e9976a5ef6b553eb825b06d73eb00", 0x91}], 0x5}, {&(0x7f0000001f80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003000)=[{&(0x7f0000002000)="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", 0x1000}], 0x1, &(0x7f0000003040)=[@rights={0x20, 0x1, 0x1, [r5, r11, r6, r0]}, @cred={0x20, 0x1, 0x2, r15, r8, r10}, @cred={0x20, 0x1, 0x2, r16, r8, r10}], 0x60, 0x4008004}, {&(0x7f00000030c0)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000003380)=[{&(0x7f0000003140)="6ef69b0b29eda736f602034615dfbb024f1013565694065028503a3637960867213f59eabc830fea8137e170cce42e31ee8cc1ce0037e55d8ed9fc8c96e53088e294f7ca3b28aaaceeb056c9d7e5c1bc2c81732d772974e9903b63764d5bb1d4a24c5d8080f90e0b60f29b174c40223b8154e3ddd07585ec4f0df1fead27d7f2da300dfcf2a6ce6a972b6ffe734e65d6ff", 0x91}, {&(0x7f0000003200)="d2e010a7a3773ae80793abf8496dc8c41fdff7780cc614e1b0f98633f49face8be28cca9223d5bde6e3cc5addfaa713e3a9484b91dc1e9702fdc2c3936d12a5ab4c1bc79908c4c662636cba50744c6d33c420e1c19bae5d92c38e18dbca0fb4824aa55c9b345e8aec2bb24d5cab1744261c1cc146761b32ca44e5a825b8bb60ada0815cb458e82fff85694d9a91036391772d41fead24696d1c6ec43a4c981933b4d84c147fda687c1f565bb32cb8f8b93ca7cb3ec2d982cfa532e89ada93e1229d1a9489e31241059", 0xc9}, {&(0x7f0000003300)="5e4eb5a2a42840da94a13bda730a1751a542de71b39e1b6e2d52ee53d325ae362607cf478b077a96d8cad0a99312486055d659ba414bace3262b1dc70438ae54644e2f22eb1d0272070459981624144ad017", 0x52}], 0x3, 0x0, 0x0, 0x4000004}, {&(0x7f00000033c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000004880)=[{&(0x7f0000003440)="abbefa682fd91b8109aae739ef970d459419df8e4a307b31ce99304811331c5419042797e146d62cce9fcc5ef1d9c974b09628e02a32fb6e03d4be4c1dafe1fbaa23749300368c16383c8d332b7d045d24c78787b772c0a1836e46b2b282c3085b1b67b0ed077640404df2797e4265f67c53385f3054c88115f8f4f5bbb8eb24a799eb8f4bcad88f5b3f7f42a4bfed192f0e8658e59c7f49b468ffd008a04ba27839f01553006372a40b37ab78692bcfd772707c723991ff2c9b", 0xba}, {&(0x7f0000003500)="9ca60fc3bb3702569cc3e8d6cf7f70650970d457668ec49b2af44ca195e2ebf79b947cf5f5adc5f4dbd5d77ca74b5f0792ae6a7aa7f4c8f9b7962e98db0f19b020f80d25e7dadabe5b7d7cba47e878b38ed14bb858e5d25b090a297dfb51b6a387c37d44086844654a1e83faa07a41f0b5ab563d2097d3902ab39ef0ed7fc4d7fd9fde566090ae141f", 0x89}, {&(0x7f00000035c0)="c1fc8af540ec3dda195f3941e0e1fd5573d012ec483fedcd54a3b4c1ed43eafb3730022b430f106e81513355f54c3c137d8f009697fd4bd0a88b19ededf4c4ca3aa349be6ffdd4d26a550f65157b4cd1bc014c560c20", 0x56}, {&(0x7f0000003640)="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", 0x1000}, {&(0x7f0000004640)="3085aca51dfcfd3b00e835e3851b7d6e0faec5351894a88703a110adc676f5559e69398af9c718d36278a8d5daa53b3d25bc8e81a0d8f88496450f753758e1982f463e2f8f19075b079fc7896ad269e684fe58c1457a4496d656b08cd944f763e2d0f8367b5914e87a96831a22dee52818785566", 0x74}, {&(0x7f00000046c0)="cfe552d7b3b3da38ceee27da5082c3a256b540d9a42eb61aa93562e63f38f3df374012dc73894163a8ce1832b58ee2db541a55d1850f3268171d9567dcc1b118bd7fc89d9159ca176ebf439cdc25f68212c1c39b5f33c67b05bd906f725e2c198b8cc3f50bb5acddf2f1a3d67f80a7b5af0c63ec42eddf7c8a3a38eda1a0341f31d78fc3ce777a08a05a9be0a1383131ee9b1c751146fb13c67f6752e84d6fe2bff35b132a313cbf49c76d448be0648c015f1a9fcddacc", 0xb7}, {&(0x7f0000004780)="e7d3c6734e6798e86740d59aacec9304aa11cdea664d9c9a0d5fdd16f6bdcc6ec183d464ab", 0x25}, {&(0x7f00000047c0)="638e700331c5babdedc5be2002de6ce11ce22dca4aa42997502708f3efdd0d16f98c9428188e257a2ba1251bab65f5bf45c18f4a6b045a95adc47377b182e88f9a58b303b45840bad915d7e7c986fc3414ab841e72f402bbb3c528f375fa3b9ba6938e239c96821f75536eeb84e89eb3ac2fc39932aaefdff46431d07139b3115fa7350ed734d0870a8ebd410c8ce0068978128f7d767887a6e53828b0aa01", 0x9f}], 0x8, &(0x7f00000049c0)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x28, 0x1, 0x1, [r0, r6, r1, r11, r1]}, @cred={0x20, 0x1, 0x2, r17, r9, r10}, @cred={0x20, 0x1, 0x2, r18, r9, r10}, @cred={0x20, 0x1, 0x2, r19, r8, r10}, @rights={0x28, 0x1, 0x1, [r6, r5, r1, r5, r6, r4]}], 0xc8}, {&(0x7f0000004ac0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004c00)=[{&(0x7f0000004b40)="7eaa9e40437a98f35faef4d98dc45c7b", 0x10}, {&(0x7f0000004b80)="de7438458375e375141f63a6da0c3668652994f28ba2530f94b6569eac4223bddd0f20386bfa98430c440dceee2f1dea55a503b410b321daa7010077504aca6741ad0e0342dfcaeafcadc0a4750859c42a67974e6f36a4aca7c593691427f65a5df3d697a84ab0ca0a", 0x69}], 0x2, &(0x7f0000004d00)=[@cred={0x20, 0x1, 0x2, r20, r9, r10}, @cred={0x20, 0x1, 0x2, r21, r9, r10}, @cred={0x20, 0x1, 0x2, r22, r9, r10}, @rights={0x28, 0x1, 0x1, [r5, r1, r6, r1, r1, r4]}, @cred={0x20, 0x1, 0x2, r23, r8, r10}, @cred={0x20, 0x1, 0x2, r24, r9, r10}, @cred={0x20, 0x1, 0x2, r25, r8, r10}], 0xe8, 0x4000}, {&(0x7f0000004e00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005e80)=[{&(0x7f0000004e80)="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", 0x1000}], 0x1, &(0x7f0000005f40)=[@rights={0x30, 0x1, 0x1, [r1, r4, r4, r11, r5, r5, r1]}, @rights={0x28, 0x1, 0x1, [r4, r4, r11, r5, r11, r4]}, @rights={0x18, 0x1, 0x1, [r11, r5]}, @cred={0x20, 0x1, 0x2, r26, r9, r10}, @rights={0x28, 0x1, 0x1, [r6, r4, r0, r1, r11, r1]}, @cred={0x20, 0x1, 0x2, r27, r8, r10}, @cred={0x20, 0x1, 0x2, r28, r8, r10}, @rights={0x20, 0x1, 0x1, [r4, r5, r1, r1]}, @rights={0x18, 0x1, 0x1, [r6, r1]}], 0x130, 0x4000080}], 0x7, 0x810) [ 2656.160584] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.165828] protocol 88fb is buggy, dev hsr_slave_1 00:52:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2656.240646] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.245822] protocol 88fb is buggy, dev hsr_slave_1 00:52:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x58) 00:52:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x34000}, [{}]}, 0x58) 00:52:51 executing program 0: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f00000003c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000000c0)) [ 2656.640655] protocol 88fb is buggy, dev hsr_slave_0 [ 2656.645814] protocol 88fb is buggy, dev hsr_slave_1 00:52:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2656.830571] kauditd_printk_skb: 171 callbacks suppressed [ 2656.830588] audit: type=1400 audit(3172.026:79517): avc: denied { map } for pid=20058 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x58) [ 2656.974434] audit: type=1400 audit(3172.036:79518): avc: denied { map } for pid=20058 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:52 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x7, 0x4, 0x6, 0x7fffffff]}) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000600)={"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"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendto$inet(r1, &(0x7f0000000440)="d772791c2dda898672f3db22783ff4ea53bce2c73ac06f899085ee341d6001b85855b522627a4b7a40f8df1050489687dda7a38dbca1ed109d00df211e564b563a7225bc84cb5155806f720dde6590312a84d66da3f316069b18af9d9009f9bb5b17bbb102f2c1207246664366f0075a9ed1e46c546f940970ae5c215e3dd9976cee794f265a0ade2383095d63cb8c906648583d625b4e3f889d37303fef64504ff538adf2bfe72d2a7ef06d7e9e454a5ab9f9df98a798f96422e1ea7b866a18bbae3df81276c24592786f9d74fef8c118bf66c7e275332e4a9435d402b8652d81f3fa3a19", 0xe5, 0x4008054, 0x0, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r4 = semget$private(0x0, 0xc75c3efcb5c808c, 0x14) semop(r4, &(0x7f00000002c0)=[{0x4, 0x5, 0x800}, {0x1, 0x3f, 0x1000}, {0x1, 0x0, 0x1000}, {0x4, 0xc0d, 0x1800}, {0x7, 0x5, 0x800}, {0x4, 0x7fff, 0x1800}], 0x6) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r2, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={'crc32-pclmul\x00\x00\x00\x00@\x00'}}) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x6, 0x40000) [ 2657.072193] audit: type=1400 audit(3172.036:79519): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.198501] audit: type=1400 audit(3172.046:79520): avc: denied { map } for pid=20058 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:52 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140036d1000000000100000025000000020100006424a279b00bbf5d18cca55b5d1a186c7056560f4b4ea48582eb726f9e2bc73302e8243314482796ca94f474ec0dec0abe7f107f99dab481a415018f3e"], 0x14}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x10, &(0x7f0000000080)=0x3, 0x4) r1 = getpgid(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={r1, r2, r3}, 0xc) 00:52:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x400300}, [{}]}, 0x58) 00:52:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2657.375344] audit: type=1400 audit(3172.046:79521): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.440627] protocol 88fb is buggy, dev hsr_slave_0 [ 2657.445801] protocol 88fb is buggy, dev hsr_slave_1 00:52:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x58) [ 2657.550675] audit: type=1400 audit(3172.046:79522): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.710590] audit: type=1400 audit(3172.116:79523): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.875778] audit: type=1400 audit(3172.116:79524): avc: denied { map } for pid=20058 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.994357] audit: type=1400 audit(3172.286:79525): avc: denied { map } for pid=20068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.092087] audit: type=1400 audit(3172.286:79526): avc: denied { map } for pid=20068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:52:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xe) msgsnd(0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:52:53 executing program 0: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffffd2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) 00:52:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6b6b6b}, [{}]}, 0x58) 00:52:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000050000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x58) 00:52:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_CAPBSET_READ(0x17, 0x0) flistxattr(r0, &(0x7f0000000040)=""/199, 0xc7) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x541, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000180)={0x0, 0x401, 0x4, 0x81, 0x14, 0x10001}) poll(&(0x7f0000000440)=[{r0, 0x8000}], 0x1, 0x5a7e4408) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0x1a, {{0xa, 0x4e23, 0x2, @mcast2, 0x8}}}, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x200, @ipv4={[], [], @remote}, 0x200}}, 0x200, 0x200, 0x0, 0x2, 0x8}, &(0x7f0000000340)=0x98) r3 = getpgrp(0xffffffffffffffff) write$P9_RGETLOCK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="080000003701000196b500200000", @ANYRES32=r3, @ANYBLOB='\t\x00vmnet1]#:'], 0x27) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={r2, 0x20, 0x7}, &(0x7f00000003c0)=0xc) 00:52:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x58) 00:52:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1000000}, [{}]}, 0x58) [ 2658.781401] input: syz0 as /devices/virtual/input/input53 00:52:54 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x10000, 0x4) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x200000, 0x0, 0xb012, r0, 0x80000000) flistxattr(r0, &(0x7f0000000000)=""/76, 0x4c) 00:52:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xe) msgsnd(0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:52:54 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x5) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+30000000}, &(0x7f0000000080)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e23, 0x3, @mcast1, 0x2757}, r3}}, 0x38) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x8910, 0x70c000) 00:52:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}]}, 0x58) 00:52:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2000000}, [{}]}, 0x58) 00:52:55 executing program 0: getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x314) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 00:52:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000003470000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2659.822664] input: syz0 as /devices/virtual/input/input55 00:52:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}]}, 0x58) 00:52:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000001c0000006c000000000000009500000000040000"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) r0 = socket(0xf, 0x6, 0x0) connect$netlink(r0, &(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xfffffe55) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200080, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x800, 0x3, 0xc97, 0xfffffffffffffff8]}) 00:52:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4000000}, [{}]}, 0x58) 00:52:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) sendto$netrom(r1, &(0x7f0000000180)="c99b4123b1cfc3658f93ee648a13755e2e6c3e7c4a38745106575759a2ec5c459a14a42bc28725661c4a8d9732a6b6b0e84d0a03e4a4c473286072d13dfe52a46bfc8d4158f5a2fde5f13358e1aac01aadd3a98e043fb3b2047c9a32de4199078e24122239ab2a801e3e632be45eeaa4ad8289b93159053c3dca08bfa0c3491d75300f11100cdfce0a14b1777ad95ada6bcf9e43ff1e817ecc78fc913493971eaeb8419a8e733cde66e010e9a54c68b592ed7fb59fac8cba95", 0xb9, 0x90, &(0x7f0000000240)={{0x3, @null}, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000380)=r1, 0xfffffffffffffc9c) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f0000000000)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d6620abaa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 2660.800575] net_ratelimit: 20 callbacks suppressed [ 2660.800585] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.810766] protocol 88fb is buggy, dev hsr_slave_1 00:52:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}]}, 0x58) 00:52:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\x06\x05\x00[\x94:\xdbO\xe2\x8cY\xee\x81s\xed\xc1\xe9\xd00x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x3ff, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x6, 0x401, 0x80000000, 0x3, r0, 0x2, [], r1, r2, 0xfffffffffffffffc, 0x5}, 0x3c) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r3) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0xffffffffffffff1e, 0x7e, 0x8, 0xfffffffffffffffe, 0x0, 0x4, 0x1002, 0x5, 0x568, 0x1ff, 0x80, 0xcba, 0x3f000000, 0x9, 0x2, 0x0, 0x1, 0xff, 0x7fffffff, 0x9, 0x6, 0x0, 0xd17, 0x10000, 0x4, 0x7, 0x2a, 0x7f, 0x2, 0x2, 0x1, 0x5, 0x1, 0x5, 0x6, 0x800, 0x0, 0xfffffffffffffffa, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x11202, 0x401, 0x10001, 0x8, 0xbd1, 0x1}, r4, 0x3, r3, 0x2) syz_execute_func(&(0x7f0000000400)="450f01c1a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000643e66460f766322d1e3e30b110f66b8c402f55e465e465b14dee509c422adaf50e3c42a0b9ec45b36f2400f7df0c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6d2afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000c4a1c32a0533f7fb1ad4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") 00:52:58 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, 0x0) ioctl$KDGKBLED(r0, 0x5403, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0xffffffff, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10003, 0x80}) 00:52:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f00000000c0)=""/63) dup2(0xffffffffffffffff, r0) open(&(0x7f00000004c0)='./file0\x00', 0x800, 0x16) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x7, 0x80) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), 0x0) write$P9_RSETATTR(r0, 0x0, 0x0) mmap(&(0x7f000040b000/0x3000)=nil, 0x3000, 0x1000000, 0x150, r2, 0x0) getsockopt$sock_buf(r3, 0x1, 0x3c, 0x0, &(0x7f0000003780)) syz_open_dev$usbmon(0x0, 0x40, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000]}}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000000000000000000000030000003000000010000000700000000000000fcffffffffffffff4000000000000000cb0000000000000000000000000000000000000000000000002000000000000000000000000000000600000000000000ff01000000000000ff0100000000000000000000000000000000000000000000010000000000000000000000000000000200000000000000000000000000000007000000000000000000000000000000000000000000000003100000000000000000000000000000b6010000000000000800000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000ff070000000000003f000000000000000000000000000000001000000000000080000000000000000000000000000000b6000000"]) listen(0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x500}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 00:52:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}]}, 0x58) 00:52:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x7000000}, [{}]}, 0x58) 00:52:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000470300000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:52:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f00000000c0)={'ip6_vti0\x00'}) close(r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000080)={0x57, 0x7, 0x5, {0x6, 0x2}, {0x101, 0x9}, @cond=[{0xfff, 0x6, 0x8, 0x7, 0xfffffffffffffffb, 0x9}, {0x40, 0x9, 0x7, 0xffff, 0x8, 0x3ff}]}) close(r1) 00:52:59 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000040)='?', 0x1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x398) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x8, 0x1}, 0x8) shutdown(r1, 0x1) 00:52:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200}]}, 0x58) 00:52:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xa000000}, [{}]}, 0x58) 00:52:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:52:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000540)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdcd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d807177135100"}, 0xd8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) openat$cgroup_procs(r3, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) 00:52:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6eeb6ef1c561040dba59fee53900010f6295a1c161dfca73aadd4d8cb48f2a023242028e1bdbc4bbd360c5e721768294d60f3c6fd875c8eea2fa5a1dd9a5f71e7518ab71863871b1f1c040e170ffde18c05309515dc5cb893f56479b396fb8c364b960e595bf735ac10d2bc0ba68d9146c3727efd56eff29f51cc7afa717750fbf6d760521136e12c4874548f96114518c6452aed82204fe8ff6b7ca9c607a759fb8991bdec020f64afa12f9cc3a604305a7a95ac58f65581d1a37803e8ae1ab0a264d7d0ac963f674ffb2244d40ba11bf7aec51f9d24fc88f303f6e88946d8103988436e91b", @ANYRES16=r1, @ANYBLOB="010300000000000000000e000000"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000003740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x48, 0x20000) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000040)={0x8001}) 00:53:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x58) 00:53:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe000000}, [{}]}, 0x58) 00:53:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6}, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = dup3(r1, r0, 0x0) getsockopt$llc_int(r3, 0x10c, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x8, 0x0, 0x5, 0x3f, 'syz1\x00', 0x3}) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0xff, 0x7fc, 0x40}) 00:53:00 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x2000) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x3d3c, 0x7, 0x0, 0x9}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0xfffffffffffffe24) read(0xffffffffffffffff, 0x0, 0x0) clone(0x80810c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) chmod(&(0x7f0000000000)='.\x00', 0x2) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000100)=0x8) r2 = gettid() tkill(r2, 0x2f) 00:53:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x11000000}, [{}]}, 0x58) 00:53:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000}]}, 0x58) 00:53:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000000c0)={0x5, 0x3, @stop_pts=0x800}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001081cb747e431100f9ff00"/26, @ANYRES32=0x0, @ANYBLOB="0000000000007b001c0012000c0001030684c45563ab832f0d1d0065727370616e00000c000200080003000800000055c8a4419391ebced065"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x14) 00:53:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x21000000}, [{}]}, 0x58) [ 2666.000624] net_ratelimit: 20 callbacks suppressed [ 2666.000634] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.010822] protocol 88fb is buggy, dev hsr_slave_1 00:53:01 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='ifb0\x00', 0x10) bind$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r1}) 00:53:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000}]}, 0x58) [ 2666.340393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33040 sclass=netlink_route_socket pig=20332 comm=syz-executor.5 00:53:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000010000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:01 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xef9, 0x402000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000001c0)) [ 2666.551934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33040 sclass=netlink_route_socket pig=20339 comm=syz-executor.5 [ 2666.564827] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.564896] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.640599] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.645935] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.999812] kauditd_printk_skb: 174 callbacks suppressed [ 2666.999828] audit: type=1400 audit(3182.206:79848): avc: denied { map } for pid=20354 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2667.040587] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.045773] protocol 88fb is buggy, dev hsr_slave_1 [ 2667.089004] audit: type=1400 audit(3182.216:79849): avc: denied { map } for pid=20354 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}]}, 0x58) 00:53:02 executing program 2: syz_emit_ethernet(0x9c, &(0x7f0000000140)={@remote, @local, [], {@mpls_mc={0x8848, {[{0x15, 0x5, 0x34, 0x1000}, {0x0, 0x4, 0x1}, {0x6, 0x6, 0x0, 0x6}, {0x7, 0xfffffffffffffff7, 0xfff, 0x1}, {0x8, 0x200, 0x8, 0x1}, {0x8001, 0x0, 0x2, 0x6}, {0x7, 0x2, 0x800, 0x183c}], @generic="68eef564b872ebe1964537eea2427485bc38b52717cdd1560952b059dba54b14520fc45e9bd50f51093a7e7ab99a28742bf6953c3ff413a29cb073dc1535b35579ab652eb26bdf0223443ba44c2f1dd763254d2c42beed50803927cd129e55811a2f1db32e4a54fb5ff3d4a4ffbbb075bddb"}}}}, 0x0) 00:53:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000018, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@broadcast, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 00:53:02 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x28d, 0x4040) clock_gettime(0x6, 0x0) 00:53:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000040000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2f000000}, [{}]}, 0x58) [ 2667.165011] audit: type=1400 audit(3182.266:79850): avc: denied { map } for pid=20355 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2667.194216] audit: type=1400 audit(3182.266:79851): avc: denied { map } for pid=20355 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2667.325804] audit: type=1400 audit(3182.286:79852): avc: denied { map } for pid=20355 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2667.394807] audit: type=1400 audit(3182.286:79853): avc: denied { map } for pid=20355 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, {}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe8) dup2(r1, r1) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast2, 0x4e22, 0x1, 0x4e22, 0x400, 0xa, 0x0, 0x20, 0x2b, r2, r3}, {0x3c0, 0x1ff, 0x3255, 0x5, 0x6, 0xfff, 0x2, 0x2}, {0x4, 0x4, 0xffffffffffff679e, 0x40}, 0x1, 0x6e6bb1, 0x0, 0x1, 0x2, 0x3}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d6, 0x33}, 0x2, @in6=@remote, 0x3503, 0x5, 0x3, 0x15812fef, 0x9c, 0x2, 0x4}}, 0xe8) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 00:53:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x32000000}, [{}]}, 0x58) 00:53:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}, 0x58) [ 2667.572244] audit: type=1400 audit(3182.296:79854): avc: denied { map } for pid=20356 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2667.793219] audit: type=1400 audit(3182.586:79855): avc: denied { map } for pid=20369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:03 executing program 5: syz_execute_func(&(0x7f00000013c0)="4a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e3292221322131dd919dec4c6c100dc55b1e6172525000e818f470fc980008080e2859ed23c788fe97c810f69e08f4cbec5c4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7ab86c4213e537700c4e13ddadf497dbf8259438f34b267f36ab40f68803000000056f20f5161c366410ffe3a168728ea0ff341ab00fe8f08e4a25600b1355809580900000081660fdf53098f49609a56c402795837c4617b708cfa00000000007466dee450c1f043fe02d134e146dec43b7d0fe4e4f4c462fd982c7bca30cac4017a7fc3bb3cbb3c0209912af3430f47bb00000000000045dc0f845000f04781ae00100000f1000000c44258f313d800d800dd4805dfdf63a5b76e0b0ba17ae64295589cffffc3c4c27197a8820000004577cb0c0ce42ec4400d000800007c1002020606b274c4410ff9720d838f09e89a5b00ddfafa485c835e2ec422e6c44115638b0c0000002cb18374fb0a07c40155f64e0666460fddc7eced36660f38058b97619236c421c96b82e2626320979747910002c1045c0b47cc47cc5c66420f1a436e2ef246e16d44800199bb00004242fbc9880c00c461b016a7df6900003422") syz_open_procfs(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f0000000300)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000c00)="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") [ 2667.841126] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.847530] protocol 88fb is buggy, dev hsr_slave_1 [ 2667.930388] audit: type=1400 audit(3182.586:79856): avc: denied { map } for pid=20369 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x33000000}, [{}]}, 0x58) [ 2668.110585] audit: type=1400 audit(3182.596:79857): avc: denied { map } for pid=20369 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:03 executing program 2: 00:53:03 executing program 0: 00:53:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}]}, 0x58) 00:53:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x46030000}, [{}]}, 0x58) 00:53:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:03 executing program 0: 00:53:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000}]}, 0x58) 00:53:04 executing program 5: 00:53:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:04 executing program 2: 00:53:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x47030000}, [{}]}, 0x58) 00:53:05 executing program 0: 00:53:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:05 executing program 5: 00:53:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x58) 00:53:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60000000}, [{}]}, 0x58) 00:53:05 executing program 0: 00:53:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:05 executing program 2: 00:53:05 executing program 5: 00:53:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) 00:53:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6b6b6b00}, [{}]}, 0x58) 00:53:06 executing program 0: 00:53:06 executing program 5: 00:53:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2671.200583] net_ratelimit: 20 callbacks suppressed [ 2671.200592] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.205735] protocol 88fb is buggy, dev hsr_slave_1 00:53:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) 00:53:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6c000000}, [{}]}, 0x58) 00:53:06 executing program 0: r0 = socket(0x20000000002, 0x2, 0x0) shutdown(r0, 0x0) shutdown(r0, 0x1) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 00:53:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x8040ae9f, 0x0) 00:53:07 executing program 2: r0 = socket(0x20000000002, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000000280)=@ethtool_stats}) 00:53:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000600000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:07 executing program 0: msgsnd(0x0, &(0x7f00000001c0)={0x1}, 0x8, 0x0) [ 2672.000580] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.005781] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.011082] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.016225] protocol 88fb is buggy, dev hsr_slave_1 00:53:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) 00:53:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x84ffffff}, [{}]}, 0x58) [ 2672.138374] kauditd_printk_skb: 205 callbacks suppressed [ 2672.138391] audit: type=1400 audit(3187.296:80063): avc: denied { map } for pid=20499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:07 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3}) [ 2672.240641] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.245817] protocol 88fb is buggy, dev hsr_slave_1 00:53:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2672.347232] audit: type=1400 audit(3187.376:80064): avc: denied { map } for pid=20499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2672.504046] audit: type=1400 audit(3187.386:80065): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:07 executing program 0: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2) 00:53:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x58) [ 2672.692032] audit: type=1400 audit(3187.386:80066): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc08c5334, &(0x7f0000000040)) 00:53:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x88ffffff}, [{}]}, 0x58) [ 2672.800585] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.805887] protocol 88fb is buggy, dev hsr_slave_1 00:53:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, 0x0) 00:53:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2672.925495] audit: type=1400 audit(3187.416:80067): avc: denied { map } for pid=20499 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2673.093250] audit: type=1400 audit(3187.456:80068): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000080)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xfffffffffffffffe]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2673.264631] Error parsing options; rc = [-22] [ 2673.280780] audit: type=1400 audit(3187.496:80069): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd8", 0x2}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x2000006) 00:53:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe0000000}, [{}]}, 0x58) [ 2673.392800] audit: type=1400 audit(3187.516:80070): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x58) 00:53:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2673.497307] audit: type=1400 audit(3187.516:80071): avc: denied { map } for pid=20499 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:08 executing program 2: rt_sigaction(0xf, 0x0, 0x0, 0x8, &(0x7f0000000180)) [ 2673.630276] audit: type=1400 audit(3187.556:80072): avc: denied { map } for pid=20502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2673.838231] *** Guest State *** [ 2673.870651] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 2673.904329] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 00:53:09 executing program 5: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="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") [ 2674.002718] CR3 = 0x0000000000000000 00:53:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x58) 00:53:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2674.033509] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 2674.095328] RFLAGS=0x00000002 DR7 = 0x0000000000000400 00:53:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffff84}, [{}]}, 0x58) [ 2674.141023] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2674.162787] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.223374] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.310972] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.398378] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.483808] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.542179] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 00:53:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000d00)="1b0000001a", 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)) connect(r1, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r1, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0305302, &(0x7f0000000040)) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x5, 0xba6c, 0xffffffffffff2965, 0x7, 0x1}) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0xb01, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x5}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x20000804) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x100) [ 2674.656291] GDTR: limit=0x00000000, base=0x0000000000000000 00:53:09 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000530000/0x2000)=nil, 0x2000}}) [ 2674.737347] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.812248] IDTR: limit=0x00000000, base=0x0000000000000000 [ 2674.887650] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2674.922009] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2674.951858] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2675.007799] Interruptibility = 00000000 ActivityState = 00000000 [ 2675.051130] *** Host State *** [ 2675.074002] RIP = 0xffffffff811c9f4c RSP = 0xffff8880418af8c0 [ 2675.112215] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2675.118840] FSBase=00007fe14f0ff700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 2675.142688] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 2675.148650] CR0=0000000080050033 CR3=00000000428df000 CR4=00000000001426f0 [ 2675.181020] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff870013a0 [ 2675.214466] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2675.242721] *** Control State *** [ 2675.252619] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 2675.283330] EntryControls=0000d1ff ExitControls=002fefff [ 2675.310820] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2675.317962] VMEntry: intr_info=80000001 errcode=00000000 ilen=00000000 [ 2675.332451] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 2675.339252] reason=80000021 qualification=0000000000000000 [ 2675.350859] IDTVectoring: info=00000000 errcode=00000000 [ 2675.356377] TSC Offset = 0xfffffa65e29283f0 [ 2675.378895] TPR Threshold = 0x00 [ 2675.391906] EPT pointer = 0x00000000a8ab201e 00:53:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x892, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000000680)="65c98ddaaece527eb6fa0488bd29115dd10013aeaa07b700b461d9ae393ffc8ed9759fb154a4d3b5", 0x28}], 0x1}}], 0x1, 0x0) 00:53:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x58) 00:53:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffff88}, [{}]}, 0x58) 00:53:10 executing program 5: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a2, &(0x7f00000002c0)={'bridge0\x00\x00\x01\x00', 0x5}) 00:53:10 executing program 2: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x80fe, 0x2, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x2f, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2675.534477] bridge0: port 3(erspan0) entered blocking state [ 2675.580653] bridge0: port 3(erspan0) entered disabled state [ 2675.623564] device erspan0 entered promiscuous mode [ 2675.629234] bridge0: port 3(erspan0) entered blocking state [ 2675.635115] bridge0: port 3(erspan0) entered forwarding state 00:53:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000004603000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}]}, 0x58) 00:53:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x40030000000000}, [{}]}, 0x58) 00:53:11 executing program 5: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x2) sendto(r0, &(0x7f0000000280)="86", 0x1, 0x0, 0x0, 0x0) 00:53:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") sched_rr_get_interval(0x0, &(0x7f0000000340)) 00:53:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) 00:53:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6b6b6b00000000}, [{}]}, 0x58) 00:53:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000600)=ANY=[@ANYBLOB="2c0000000c060501ff0080fffdffff2e0a0000000c000100060000007d0a00010c001fc1992aa56016f60000"], 0x2c}}, 0x0) 00:53:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}]}, 0x58) 00:53:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2676.400679] net_ratelimit: 20 callbacks suppressed [ 2676.400688] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.411314] protocol 88fb is buggy, dev hsr_slave_1 00:53:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") listxattr(0x0, 0x0, 0x0) [ 2676.610231] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 00:53:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000740)=""/29, 0x1d}, {&(0x7f00000000c0)=""/30, 0x1cd}], 0xffffffffffffe70}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000f40)=[{&(0x7f00000007c0)=""/198, 0xc6}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x49d}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) [ 2676.960595] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.965803] protocol 88fb is buggy, dev hsr_slave_1 00:53:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x100000000000000}, [{}]}, 0x58) 00:53:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2677.041740] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.046903] protocol 88fb is buggy, dev hsr_slave_1 00:53:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}]}, 0x58) 00:53:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000640)=0x400100000001, 0x3d5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f0000000000), 0x120) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) [ 2677.336033] kauditd_printk_skb: 173 callbacks suppressed [ 2677.336049] audit: type=1400 audit(3192.546:80246): avc: denied { map } for pid=20655 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2677.440609] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.445791] protocol 88fb is buggy, dev hsr_slave_1 [ 2677.521744] audit: type=1400 audit(3192.556:80247): avc: denied { map } for pid=20655 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:12 executing program 5: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x91) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x108) r2 = dup2(r0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000100), 0x1c) r4 = dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 00:53:12 executing program 2: timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) readv(r2, &(0x7f0000000640)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) ptrace(0x10, r1) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2677.697642] audit: type=1400 audit(3192.706:80248): avc: denied { map } for pid=20661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x200000000000000}, [{}]}, 0x58) 00:53:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}]}, 0x58) [ 2677.857319] audit: type=1400 audit(3192.706:80249): avc: denied { map } for pid=20661 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.029482] audit: type=1400 audit(3192.766:80250): avc: denied { map } for pid=20661 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.163964] audit: type=1400 audit(3192.786:80251): avc: denied { map } for pid=20663 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.240597] protocol 88fb is buggy, dev hsr_slave_0 [ 2678.245811] protocol 88fb is buggy, dev hsr_slave_1 [ 2678.339454] audit: type=1400 audit(3192.786:80252): avc: denied { map } for pid=20663 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x400000000000000}, [{}]}, 0x58) 00:53:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x11, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000180)={"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"}) 00:53:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000}]}, 0x58) [ 2678.445551] audit: type=1400 audit(3192.796:80253): avc: denied { map } for pid=20661 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.578961] audit: type=1400 audit(3192.796:80254): avc: denied { map } for pid=20661 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.737798] audit: type=1400 audit(3192.816:80255): avc: denied { map } for pid=20661 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x500000000000000}, [{}]}, 0x58) 00:53:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000100000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x58) 00:53:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 00:53:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x600000000000000}, [{}]}, 0x58) 00:53:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x11, r2, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000180)) 00:53:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x58) 00:53:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x7147) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x2) 00:53:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000500000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000}]}, 0x58) 00:53:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x700000000000000}, [{}]}, 0x58) 00:53:15 executing program 0: 00:53:15 executing program 5: 00:53:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}]}, 0x58) 00:53:16 executing program 0: 00:53:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xa00000000000000}, [{}]}, 0x58) 00:53:16 executing program 5: 00:53:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000034600000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:16 executing program 2: 00:53:16 executing program 0: 00:53:16 executing program 5: 00:53:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x58) 00:53:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe00000000000000}, [{}]}, 0x58) [ 2681.600591] net_ratelimit: 20 callbacks suppressed [ 2681.600600] protocol 88fb is buggy, dev hsr_slave_0 [ 2681.610854] protocol 88fb is buggy, dev hsr_slave_1 00:53:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:17 executing program 5: 00:53:17 executing program 0: 00:53:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x58) 00:53:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1100000000000000}, [{}]}, 0x58) 00:53:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:17 executing program 2: [ 2682.365833] kauditd_printk_skb: 186 callbacks suppressed [ 2682.365848] audit: type=1400 audit(3197.576:80442): avc: denied { map } for pid=20820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2682.400631] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.405813] protocol 88fb is buggy, dev hsr_slave_1 [ 2682.411117] protocol 88fb is buggy, dev hsr_slave_0 00:53:17 executing program 5: [ 2682.416274] protocol 88fb is buggy, dev hsr_slave_1 00:53:17 executing program 0: [ 2682.551779] audit: type=1400 audit(3197.656:80443): avc: denied { map } for pid=20820 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2682.640606] protocol 88fb is buggy, dev hsr_slave_0 [ 2682.645792] protocol 88fb is buggy, dev hsr_slave_1 00:53:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x58) [ 2682.721207] audit: type=1400 audit(3197.656:80444): avc: denied { map } for pid=20820 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2682.909695] audit: type=1400 audit(3197.656:80445): avc: denied { map } for pid=20820 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2100000000000000}, [{}]}, 0x58) 00:53:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000004000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:18 executing program 5: 00:53:18 executing program 0: [ 2683.040005] audit: type=1400 audit(3197.696:80446): avc: denied { map } for pid=20820 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:18 executing program 2: [ 2683.180631] audit: type=1400 audit(3197.696:80447): avc: denied { map } for pid=20820 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.205030] protocol 88fb is buggy, dev hsr_slave_0 [ 2683.205091] protocol 88fb is buggy, dev hsr_slave_1 00:53:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x58) [ 2683.435083] audit: type=1400 audit(3197.726:80448): avc: denied { map } for pid=20820 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:18 executing program 0: 00:53:18 executing program 5: 00:53:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2683.629707] audit: type=1400 audit(3197.726:80449): avc: denied { map } for pid=20820 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x2f00000000000000}, [{}]}, 0x58) [ 2683.788500] audit: type=1400 audit(3197.736:80450): avc: denied { map } for pid=20822 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:19 executing program 0: 00:53:19 executing program 2: 00:53:19 executing program 5: [ 2683.979612] audit: type=1400 audit(3197.756:80451): avc: denied { map } for pid=20824 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x58) 00:53:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3200000000000000}, [{}]}, 0x58) 00:53:19 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf000c4000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, 0x0) 00:53:19 executing program 5: pause() syz_execute_func(&(0x7f0000004f40)="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") 00:53:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x58) 00:53:19 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x6, 0x0) 00:53:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x3300000000000000}, [{}]}, 0x58) 00:53:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x58) 00:53:20 executing program 2: pause() syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e1a5f97300661f3a8e16649c675100617b2ee32222414ad04b00c442019dcc0510d46f") syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') syz_execute_func(&(0x7f0000001080)="c4e379614832074a2be928c693980f053ef3aec4a37bf0c50141e2e9c4e259dc1eebd995f214401bed38463d66dc0080f598f7a907000000984a67e8b1c84521008251465428f842c4f4470f1a25123b0000bd9ecf491ef3450f113ac2e54cc54cbec5c54d0f2c718f56ee44c4e1e85c07c4e33d6c0351b4c8c4c4deed26406d41564733ad0a000000c4817a2cffc423c96cb83d000000fef2420f2af9415e65eddf0fbd66450f3ac4c2793220bb0400000008ec660fdf53096bd104a8e11e430fae2727660f6eb45b000880417cd8dcb775ae3d3e25e03df3c4619062c42279791fe4ec2646aff2290f7c142cc41de90e77b700400f38253d030000000d6a6addbfbfc2801d9c9ec9e8e9362665e94612f5c8868ad0813d940fdc04a586d20000ddcec4a17ae64295007b1cff9fa8282e3624245af766400f3a22d70e0000000d5df82e440fdd0636b2aaf344aed9af41afa2f36baf0054e39978c104c0414c598374fb0a07c4438122d205accd58f3420f127d92450f3911b10700000000676466440f3a0fd10083b7e5a0cd6c00f2ad02c306848446f6ca72949447cc5c65082d0800006042a7400f72e0c55ec4034d69da770c0c4242414974ecd53131660f634900c4a275fed351315131185e7e0054ec") 00:53:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4603000000000000}, [{}]}, 0x58) 00:53:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000004000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:20 executing program 5: pause() syz_execute_func(&(0x7f0000000a40)="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") 00:53:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) socket$bt_hidp(0x1f, 0x3, 0x6) setrlimit(0xd, &(0x7f0000000080)={0x1, 0x59a}) r1 = socket$tipc(0x1e, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg(r0, &(0x7f0000000000), 0x0, 0xffd8) 00:53:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x58) 00:53:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4703000000000000}, [{}]}, 0x58) 00:53:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}]}, 0x58) 00:53:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) mkdirat(r1, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r1, &(0x7f0000000380)=""/80, 0x50) unlinkat(r1, &(0x7f0000000080)='./control\x00', 0x200) 00:53:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6000000000000000}, [{}]}, 0x58) 00:53:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}]}, 0x58) [ 2686.800604] net_ratelimit: 20 callbacks suppressed [ 2686.800615] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.810826] protocol 88fb is buggy, dev hsr_slave_1 00:53:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f00000002c0)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000080)=""/231, &(0x7f0000000180)=0xe7) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="240000001a0007041dfffd946f6105000a0000001f0000000000080008000300022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x2a9}, 0x0) 00:53:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6c00000000000000}, [{}]}, 0x58) [ 2687.360637] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.365869] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.440640] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.445811] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.478367] kauditd_printk_skb: 192 callbacks suppressed [ 2687.478382] audit: type=1400 audit(3202.686:80644): avc: denied { map } for pid=20982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.568144] audit: type=1400 audit(3202.746:80645): avc: denied { map } for pid=20982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.710631] audit: type=1400 audit(3202.746:80646): avc: denied { map } for pid=20982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.778749] audit: type=1400 audit(3202.756:80647): avc: denied { map } for pid=20982 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.805456] audit: type=1400 audit(3202.766:80648): avc: denied { map } for pid=20982 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.829776] audit: type=1400 audit(3202.766:80649): avc: denied { map } for pid=20982 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.857234] audit: type=1400 audit(3202.776:80650): avc: denied { map } for pid=20982 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.860615] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.881783] audit: type=1400 audit(3202.816:80651): avc: denied { map } for pid=20983 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.886510] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.910538] audit: type=1400 audit(3202.816:80652): avc: denied { map } for pid=20983 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2687.938784] audit: type=1400 audit(3202.856:80653): avc: denied { map } for pid=20983 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.640595] protocol 88fb is buggy, dev hsr_slave_0 [ 2688.645770] protocol 88fb is buggy, dev hsr_slave_1 00:53:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') sendfile(r0, r1, 0x0, 0x1) 00:53:24 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) openat$cgroup_type(r1, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000100)=0x3ff, 0x4) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{}]}) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000), 0x4) 00:53:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}]}, 0x58) 00:53:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x84ffffff00000000}, [{}]}, 0x58) 00:53:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000140), 0x800000000086, 0x0, &(0x7f0000000000), 0x0, 0x0) 00:53:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x88ffffff00000000}, [{}]}, 0x58) 00:53:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x58) 00:53:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) 00:53:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x5) r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc01f00, 0x1, 0x0, 0x0, 0x2000000000002) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x3f, 0x4) 00:53:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:24 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b000007110600f3ff01000b000100020423ca0000cfda0918275ea542b793a4c9db284729bf789048f95a86191b8ab47d29a495702c400911417d1a", 0x262) 00:53:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xe000000000000000}, [{}]}, 0x58) 00:53:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}]}, 0x58) 00:53:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2}, [{}]}, 0x58) 00:53:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}]}, 0x58) 00:53:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4}, [{}]}, 0x58) 00:53:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x58) 00:53:26 executing program 5: memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) memfd_create(&(0x7f0000000000)='ns/mnt\x00', 0x2) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') clone(0x2ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_WIE_OFF(r1, 0x7010) msgrcv(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2e907f2a9c6a8469a754c7d7f47d73296a62a1b7b41427e71d7c5427974f7df13a1924cf04e5"], 0x1, 0x0, 0x0) 00:53:26 executing program 2: syz_read_part_table(0x1000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000000)="0be5a941", 0x4}]) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x3) 00:53:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2691.998019] QAT: Invalid ioctl [ 2692.001469] net_ratelimit: 20 callbacks suppressed [ 2692.001479] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.001556] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.595822] kauditd_printk_skb: 115 callbacks suppressed [ 2692.595838] audit: type=1400 audit(3207.806:80769): avc: denied { map } for pid=21076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2692.641081] audit: type=1400 audit(3207.836:80770): avc: denied { map } for pid=21076 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2692.665457] audit: type=1400 audit(3207.846:80771): avc: denied { map } for pid=21076 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2692.800634] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.805818] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.811133] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.816275] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.909493] audit: type=1400 audit(3208.116:80772): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/root/syz-executor.0" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 2692.990583] audit: type=1400 audit(3208.176:80773): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/root/syzkaller-shm959685404" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 2693.040612] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.045788] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.080599] audit: type=1400 audit(3208.186:80774): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5930 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2693.130582] audit: type=1400 audit(3208.236:80775): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5930 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2693.180579] audit: type=1400 audit(3208.236:80776): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5930 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2693.230594] audit: type=1400 audit(3208.266:80777): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5930 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2693.270134] audit: type=1400 audit(3208.316:80778): avc: denied { map } for pid=21077 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5930 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 2693.343875] IPVS: ftp: loaded support on port[0] = 21 [ 2693.600597] protocol 88fb is buggy, dev hsr_slave_0 [ 2693.605764] protocol 88fb is buggy, dev hsr_slave_1 [ 2694.388116] bridge0: port 3(erspan0) entered disabled state [ 2694.396840] device erspan0 left promiscuous mode [ 2694.402493] bridge0: port 3(erspan0) entered disabled state [ 2694.487383] chnl_net:caif_netlink_parms(): no params data found [ 2695.239969] bridge0: port 1(bridge_slave_0) entered blocking state [ 2695.247291] bridge0: port 1(bridge_slave_0) entered disabled state [ 2695.256488] device bridge_slave_0 entered promiscuous mode [ 2695.695967] bridge0: port 2(bridge_slave_1) entered blocking state [ 2695.702624] bridge0: port 2(bridge_slave_1) entered disabled state [ 2695.710270] device bridge_slave_1 entered promiscuous mode [ 2695.732996] IPVS: stopping master sync thread 26665 ... [ 2695.738793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2695.746643] IPVS: stopping backup sync thread 18573 ... [ 2695.752747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2695.778559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2695.787078] team0: Port device team_slave_0 added [ 2695.793551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2695.806981] team0: Port device team_slave_1 added [ 2695.866334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2695.874637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2695.963139] device bridge_slave_1 left promiscuous mode [ 2695.968730] bridge0: port 2(bridge_slave_1) entered disabled state [ 2696.031784] device bridge_slave_0 left promiscuous mode [ 2696.037412] bridge0: port 1(bridge_slave_0) entered disabled state [ 2697.200583] net_ratelimit: 18 callbacks suppressed [ 2697.200593] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.210796] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.760632] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.766250] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.840614] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.845800] protocol 88fb is buggy, dev hsr_slave_1 [ 2698.240644] protocol 88fb is buggy, dev hsr_slave_0 [ 2698.247384] protocol 88fb is buggy, dev hsr_slave_1 [ 2699.040641] protocol 88fb is buggy, dev hsr_slave_0 [ 2699.045824] protocol 88fb is buggy, dev hsr_slave_1 [ 2702.400653] net_ratelimit: 16 callbacks suppressed [ 2702.400663] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.410841] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.200652] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.205835] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.440649] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.445821] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.734063] device hsr_slave_1 left promiscuous mode [ 2703.778738] device hsr_slave_0 left promiscuous mode [ 2703.829510] team0 (unregistering): Port device team_slave_1 removed [ 2703.845328] team0 (unregistering): Port device team_slave_0 removed [ 2703.860221] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2703.907785] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2704.000622] protocol 88fb is buggy, dev hsr_slave_0 [ 2704.006022] protocol 88fb is buggy, dev hsr_slave_1 [ 2704.080612] protocol 88fb is buggy, dev hsr_slave_0 [ 2704.085886] protocol 88fb is buggy, dev hsr_slave_1 [ 2704.114561] bond0 (unregistering): Released all slaves [ 2704.214681] device hsr_slave_0 entered promiscuous mode [ 2704.241036] device hsr_slave_1 entered promiscuous mode [ 2704.281760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2704.310036] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2704.371762] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2704.508330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2704.523049] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2704.535869] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2704.543387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2704.552691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2704.563833] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2704.569980] 8021q: adding VLAN 0 to HW filter on device team0 [ 2704.583574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2704.591223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2704.599431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2704.610047] bridge0: port 1(bridge_slave_0) entered blocking state [ 2704.616557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2704.638847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2704.649925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2704.661488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2704.672486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2704.690944] bridge0: port 2(bridge_slave_1) entered blocking state [ 2704.697396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2704.717737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2704.734831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2704.752357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2704.761470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2704.783389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2704.792482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2704.811928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2704.824065] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2704.842197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2704.850371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2704.868596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2704.891159] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2704.908695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2704.917394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2704.933535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2704.941009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2704.958443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2704.970313] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2704.989402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2705.032904] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2705.069297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2705.199671] kauditd_printk_skb: 1 callbacks suppressed [ 2705.199687] audit: type=1400 audit(3220.406:80780): avc: denied { map } for pid=21083 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2705.265301] audit: type=1400 audit(3220.466:80781): avc: denied { create } for pid=21082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:53:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x5, 0x10000, 0x4, 0x10000, 0x100000001}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") close(r0) 00:53:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x5}, [{}]}, 0x58) [ 2705.339103] audit: type=1400 audit(3220.466:80782): avc: denied { write } for pid=21082 comm="syz-executor.0" path="socket:[296686]" dev="sockfs" ino=296686 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:53:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x58) 00:53:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) fstat(r1, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000001000/0x2000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000000000/0x1000)=nil, &(0x7f00005d6000)) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername(r0, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x80) accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) accept4(r0, &(0x7f0000000240)=@can={0x1d, 0x0}, &(0x7f00000002c0)=0x80, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000300)={@broadcast, @local, 0x0}, &(0x7f0000000340)=0xc) accept4(r1, &(0x7f0000000380)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000540)=0xe8) getsockname$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000800)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000a40)={@initdev, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000b80)={0x0, @broadcast, @dev}, &(0x7f0000000bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000c00)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000c40)={0x0, @empty, @multicast2}, &(0x7f0000000c80)=0xc) getsockname$packet(r1, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000010c0)={0x0, @initdev, @initdev}, &(0x7f0000001100)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001140)={'team_slave_0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001980)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001a80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001ac0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000001bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001cc0)={'team0\x00', 0x0}) accept(r0, &(0x7f0000001e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001f00)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001f40)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002040)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002140)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002180)={'bond0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002b00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002ac0)={&(0x7f00000021c0)={0x8d0, r2, 0x201, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x168, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x118, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x2, 0x9, 0x7fffffff, 0x9}, {0x6, 0x8b0, 0x100000001, 0x5}, {0x2, 0x7fff, 0x81, 0x9}, {0xfffffffffffff001, 0x4, 0x4, 0xff5c}, {0x2, 0x8, 0x200, 0x9}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x238}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r12}, {0x19c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x10c3}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x3000000, 0xf687, 0x451, 0x1}, {0x8343, 0x2, 0x10001, 0x4}, {0x6, 0xc, 0x8170}, {0x400, 0x100, 0x20, 0x4}, {0x586, 0xfffffffffffffc7c, 0x800}, {0x6, 0x6, 0x3c12, 0x5}, {0xfffffffffffffffb, 0x2, 0x7, 0x6}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x168, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}]}}, {{0x8, 0x1, r20}, {0x1ac, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r25}, {0x50, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x395f, 0xffffffffffff8001, 0xcc7, 0x8}, {0x3, 0x12e, 0x7ff, 0xffff}, {0xffffffff, 0xffffffffffffffff, 0x1, 0x6}]}}}]}}, {{0x8, 0x1, r26}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xd87c}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r28}}}]}}]}, 0x8d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) fcntl$setsig(r0, 0xa, 0x11) 00:53:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = memfd_create(&(0x7f00000000c0)='/dy\xbdv/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) signalfd4(r1, &(0x7f0000000000)={0x9}, 0x8, 0x80000) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) [ 2705.376785] audit: type=1400 audit(3220.506:80783): avc: denied { create } for pid=21082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2705.562653] audit: type=1400 audit(3220.776:80784): avc: denied { map } for pid=21094 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000005000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x58) 00:53:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [{}]}, 0x58) [ 2705.674200] audit: type=1400 audit(3220.776:80785): avc: denied { map } for pid=21094 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2705.817080] audit: type=1400 audit(3220.946:80786): avc: denied { create } for pid=21088 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:53:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/12) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) flistxattr(r2, &(0x7f0000000040)=""/130, 0x82) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, 0x0, 0x0, r2, 0x7}) [ 2705.992582] audit: type=1400 audit(3220.956:80787): avc: denied { write } for pid=21088 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:53:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7}, [{}]}, 0x58) [ 2706.161131] audit: type=1400 audit(3220.996:80788): avc: denied { read } for pid=21088 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:53:41 executing program 2: perf_event_open$cgroup(&(0x7f00000009c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x0, 0x0, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3bb, 0x2, 0x0, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffba2d, 0x4, 0x6, 0x0, 0x2c, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x7, 0x0, 0x1}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x3, 0x182) r1 = socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) eventfd2(0x5, 0x800) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 00:53:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x58) [ 2706.343837] audit: type=1400 audit(3221.086:80789): avc: denied { map } for pid=21103 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:41 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x800100000037) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000100)=ANY=[@ANYBLOB="63a00000000000000200000000000000ffff0000000000004953ffffffffffff0400000000000000267f810600000000000000000000000000000000000000000000000000a196000000000000000000090000000000000003000000000000004e03000000000000030800"/144]) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0xffffffffffffff80) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80) 00:53:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa}, [{}]}, 0x58) [ 2707.520797] net_ratelimit: 22 callbacks suppressed [ 2707.520807] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.531006] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.600591] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.605768] protocol 88fb is buggy, dev hsr_slave_1 00:53:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6276, 0x400) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 00:53:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x800100000037) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000100)=ANY=[@ANYBLOB="63a00000000000000200000000000000ffff0000000000004953ffffffffffff0400000000000000267f810600000000000000000000000000000000000000000000000000a196000000000000000000090000000000000003000000000000004e03000000000000030800"/144]) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0xffffffffffffff80) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80) 00:53:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}]}, 0x58) 00:53:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000240)={0x7, 0x1b, 0x2}, 0x7) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101002, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000080)={0x6, 0x2, 0xff, 0x1a1}) sendto$inet6(r0, &(0x7f00000000c0)="e0ae8f1df5540dacf97d2ee5880a22920e3e69e0d6da08ae07c934c596aabfe66063446687710f951cf632f611f6ea3e594d3b2d66f408f566411d1aad2622725f346662cf323a045866c199e982ae8b07dcce2c0731ac5bb9ad7749c824254d82ba1a65146554f2d201542f6112b2f0", 0x70, 0x40, &(0x7f0000000140)={0xa, 0x4e20, 0x6, @loopback, 0x80}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x10, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept$inet6(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x1c) 00:53:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe}, [{}]}, 0x58) [ 2708.160621] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.166591] protocol 88fb is buggy, dev hsr_slave_1 00:53:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11}, [{}]}, 0x58) 00:53:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000010000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}]}, 0x58) [ 2708.240618] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.246005] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.362892] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 00:53:43 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x801, 0x3) bind$bt_l2cap(r1, &(0x7f0000000040), 0xe) listen(r1, 0x3) r2 = dup2(r1, r0) ioctl(r1, 0x4, &(0x7f0000000100)="d5e8c4b6a2b850732838fbd08c870c8e387aaaf12ba2c242a30ed54098ebe4293e262a5900f717304d81f5aecb585e92db8440595d0b7d32231104a24f8d1f53855765a38b3332c3fc4abbe33969b2db25129c8ac954b4e94f602639d10b098e9e9c8531c0dd13a1db8fb0cd97a3b3c105ca4e172d4bea72993fc9a861abdcaa9b2ada2f582c0662c574f4de7deef14de9ac307d96c02f5f1fe4567b87f456c37079bb4815013d2492aed04ac6f215147962b64066354ce56040216b04229707b53c969dd74ecc72761c770c91") getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x8, 0x4) semget$private(0x0, 0x4, 0x410) [ 2708.413910] bridge0: port 3(erspan0) entered disabled state 00:53:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x800100000037) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000100)=ANY=[@ANYBLOB="63a00000000000000200000000000000ffff0000000000004953ffffffffffff0400000000000000267f810600000000000000000000000000000000000000000000000000a196000000000000000000090000000000000003000000000000004e03000000000000030800"/144]) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0xffffffffffffff80) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80) [ 2708.500511] bridge0: port 1(bridge_slave_0) entered disabled state 00:53:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000040000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2708.611648] bridge0: port 2(bridge_slave_1) entered disabled state [ 2708.640624] protocol 88fb is buggy, dev hsr_slave_0 [ 2708.646106] protocol 88fb is buggy, dev hsr_slave_1 [ 2708.854236] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 00:53:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x21}, [{}]}, 0x58) 00:53:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}]}, 0x58) 00:53:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6276, 0x400) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 00:53:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000e6bffc)=0x800002, 0x4) setsockopt$inet_int(r0, 0x0, 0x17, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000)=0x1, 0x4) 00:53:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f}, [{}]}, 0x58) 00:53:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}]}, 0x58) 00:53:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2709.692692] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 00:53:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x715371) fchown(r0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000340)) 00:53:45 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0x2}) pread64(r0, &(0x7f0000000100)=""/216, 0xd8, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4001, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)=0x6) 00:53:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6276, 0x400) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 00:53:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x32}, [{}]}, 0x58) 00:53:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x58) [ 2710.217578] kauditd_printk_skb: 131 callbacks suppressed [ 2710.217595] audit: type=1400 audit(3225.426:80921): avc: denied { map } for pid=21228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2710.445180] audit: type=1400 audit(3225.496:80922): avc: denied { map } for pid=21230 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2710.452551] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 00:53:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="4000c7d16b7a902c149e000000000000000000008d1602064bbaf295b1b6a8b4df84577b114d577e8e31f930dbc8883229ab11518872a834e888ce3dfc6a0e760bce5ace365a4afa5ab81e89", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c000200080001c0e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000001c0)={0x2, 0x0, [{0xc000001f, 0x6, 0x4, 0x81, 0x1, 0x0, 0x1}, {0xa, 0x8, 0x7, 0x7ff, 0x18, 0x0, 0x120000}]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) [ 2710.619282] audit: type=1400 audit(3225.506:80923): avc: denied { map } for pid=21228 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}]}, 0x58) 00:53:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x33}, [{}]}, 0x58) [ 2710.766700] audit: type=1400 audit(3225.556:80924): avc: denied { map } for pid=21230 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2710.928401] audit: type=1400 audit(3225.556:80925): avc: denied { map } for pid=21230 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2711.002483] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31339 sclass=netlink_route_socket pig=21256 comm=syz-executor.0 00:53:46 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0xff, 0x7, 0x0, &(0x7f0000000100)) socket(0x8, 0x80000, 0x2) sendmmsg(r0, &(0x7f00000019c0)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000140)="9bb640490d050635275f16b9b873c32c292817a701ccdbae8cb08069c032ee0dbb494c5b1e43be9483766fc97b87b94c8d761827812bd917c0c28f01a699ef87986e72524cc1aeb2c8a049e858c8b9e72cd3f7471897b0acdfbea487acca20c76b9728d2c443334aa60df43d87be420330627e4fb99addc8f3cb6434ea4d00e96d2cfff29dbd2ce5b6b84a584c1d53a3e381536b1427f2c06cfa0c368c8599084914afc3d4bacd6f2b8894300bc28f2e0ce33ca0e7e52a4c7ebb38c6562fca165edc815fdca5634ad7b25f95cba30774ad8cf203d97ab41dc0e1b57f645b6262d1c378aa6e950592e84484309d1e5bdcab847a1122d48311e140b8b9e0e44c5cf4636b725542c68f0c4ed4d077a39205dd6f010e0cb351670b515caa851d9131eef1977d376e8bf1a8cf4858fff050964d2776593cc4264d8209360222503361382b6001697a271b49ff608ae028afd0455024a140463989de2f245447086e21bc95675a7e0ee6609bbf586cc78acac3abe396eba5e4347678f8567926458d297f6dfc3cd046a0f11b9ed035f932ae83a34fc35a9e2332b132ce98ba70f7815ea0496d41ab66b7036c842d3bc60cb03573cd7d56179c91c2ec9eb1ff93ac79434334cb591c3b0cc29bfcac73e07bffcffbd43c5e17f71cb75c21679596720c0c9892cce656b516ff6e11b1422b6e5bbc7209f8d5681b963b1a56921c41fbaab5b9f0415dc4fc66e887cd8e9be407ee4ab46ce66966b615cd081cbd37de1e1fe8696fc89547eac2b10bf59fb9369f20cd6479652e9c5f7b125f0ea9f9932a247071963df5a2afc838308dd3acef3c3b3d87c5f6d8a28c39509e56cf508cc24d4b87859a32a6477c61e9f5e9dcc80b349849d33c682659bd73111b29189eb697850cf73fb42f6378b8ece8c1d200df911aa098957d67a95d60b3aa9f77cee9ba46f215a10f1b4cd5fb527cb6f1822adeae32979185d85b1396c1100cd905e7d41bcd9ba042994be637d0e0dc39bdd5afaaa5c28384f4fa04008e003097c1e0656dfbfbc6da1b44ddd36fa67ab4b2ea15ef8eecfee10d487683f97a473ec8c477a4d021cdcc8f368bc1c3af879eded02ab799f6902943ef48e5a4bf93e5cbaf1d4c2636cbc30fca01ed7f67b188dae692cd755c72a20ffb078393c17503159902f291dc23d4c3a2f16457e43e4718ee07d0f5eca75fca25c1aa78e846b4913b992fa0f2384c1b691c469e732746f31fc82aba8894a6e5f7ae87b245a06ffa5a3c2289e15174d6b14a66435a742809ef4ce4ad83517b7855b1fac222ebe3223441ca46019afef78fc5a76013347f9f7eb9ff9716b7e25554d6b42a76d0fef9f14b9a4399f21094bfbcae56197cd464d0aa7fff63874527cec15f30275a027f4bff2f17a1fe53cb94eb1f9e5e352ac9706308bcbf5565fd4ef510a10860ebab3449b539fb2daa48c54be20827b50e4b78faea724e78e46821f8776075af1a4a58146deb654fad644fb1e4e150337460cb7e18216294e3bb2b815d0fe7fd48fae7f32a5f4242c95825fa75944503a072705574fb89b18cf059dd0cbaea008043c2a4c1c136496c5c300e487707842bbb7f854e9c875b9f02303624625caa06641308319a831ddc91a8a9ba7d52ffd70e1b27a09cef10eed451c4aa74ed5407532e5fbe7aea79f32b418ee18796ceda205d72c98f3cda3c8a30df64fe3064c142edc9408532485d2ad2b5bfaa1353980a2e89956e8001186a5233ceca7f321b8afb56b7763e17b6a89f86ad48f1f95be21165a0c8ad1f65fd29f59ec93ed5041384b6551e5ece70b2d349478c58f9e31589e27b4dca8105055b5c0df31401bbf51f94c786139111304f59c9573caf6df0fa02b92f6fea44a869503fe511e8f454c5387a14e73db02798fff1038a9bb03210d681165e245012cea9f4f0dc83cb65e9152696c85541c27b1ba1bc4188de516d7a3eb7525f8c5ba416b2070bec50dad8ccab84674b6a69031eb68c13e485ecf7e07d8e0d262cd7982b3c7bf2561470110db87dbfc3d390c6b51c8eb2346cf65aff54aa224a4319eceb06cace4a6016b98d13bbc888f5a6a6777ed7267757e10a1884c819d82d54d95a68054a834ef346501276c0f5d8cab4b876283ea73c0bd6e0033bc7ba900c599a49d033d51b8f24dbaca162ab16f5c2d056b2febe7582cc834e6cd54024c4888874be5d56f3d4612426143fdb15c5c20ab22770e8658ba09e932a0d58b8e0f1ae89f0b13f2eb8ef2a1a5b2dc3b5d89488ef9e1a3bb164b8cef539694d3bff1da8a1f9647546e47bc5107c43086c165eb0b11ba5ebcf435fd488750eadbe63baf27b176b5cd33665db66a30700c4dc0c89f7033b7f4d1c59f1ed0e194b0696eb612d9d895bdf6cdf2140bfd0d67e52d20ebf827f92c885c58609412f4bb42d6dd270068f33782f9a1bc08bf48ea6742734620e4ffa06df9b08299a17678b26ddcbd9da822cdb6be93cb207e6f569d5fe93d7ba052191691ae7ec0287aec9298f5f2c647c46fa6a6a955beeb4bbe5d29b3b22df9f0ef57902ed6be87c9f3647d426cf8616bf01634c0d0880b4326bf67948328812f660215ef693a716574568f891d4325a8b7361e15815d242c40158679ff77be90c22401e90f3c77b93c0dece33512e741f4f361b0eec5308d9ff0f486535f9f3488bd0c7f612dafd490ec7736ba3c61c61e1eed8265a9b0620dd0dbd844ab8c6d84dcd391f0ad58d4ba92d2d4c6e09eb30d31355d305d54cc9729f96dd65b738398ef04360379ee321e84cfcc7fe9c054af7b19aec1cd297710d2f480f8eb28f6d84e5a9d8d212eb81e94b8ada3c6dfba0d4dfab478c91e582d18e449357ecbf0819d34c66cabf2d13cd02013a0fc9101a91a277d265acc55b3f8fdfabeedf98e93c5569bf407d38f7d4d1bda106f02aff25af0715a933717245dcbe52fef5fd6ea00c7bd1d62258e2874450e14e7c0b60e9a771716d549cee22f9206fb912da96964a41e593dd8cd3d15af2b06f2b50059c471bca325572928883af24e54fece9a21cb9697ac1942c9d8897bd239250e61decf5ee0b51b5130ed1d1269314af82ed818d6c5168f3bf01cfbc4774fcf8f5903df8537b389842243db51dea89459d948be14a0d6f2287c88f4737d6c92d7f1e09b553dc7ba7503746fdade2a487d58e568623612b7f56d4c822c426fa0e62a4eac0107cd913af5ef6d582dd77ed49bc2ed19856a5dcec18bcef7231e0489f75f8f48d269b96ac66a011c0bc8e5cd89f5728811494f87988ad624fb27d131118d6702a4b340cdf6cfb0520b055ea30dec1b730afc09afc9823a8982d8122d9d989482dd8bd18c2b885d7289c539e9dca038f5e73f4026617b1594dd33658d50101df9dd3479872a56c9614900f39457f9f3486b3aef5a8da5daa7eabfb0fed4cef29c2e92ff4ff2317d0c9463688b0077be3899521a9fa7b0762a658ee9f22e4ced9a33e942cf417686eb3c25d081a35aecdeb1af6cc5921f270074b5ea995d3b099cd9e1548229611f47c30ca12b950e500c82edac4b517abb2a174ff0568c3667de0be684c5d64924c6c7cedd25b30dd09cbe60925bcdd8b42438bc8a7c05c1201d76ea26f4e8bae9a552a6a1ad68fb8592c2c0abc7ef962680f5dc2d9538a3a434553ab0606a9d1bcf10141ea97f6c2af433c36b5f62bf6d5418eabf6bf0f8a0844c295426c8bddb7ff84ed893bac26f013ed06d0e6c5b9c0e7f1ac6e303f41d6f40b384f42f5f75c472d6b1f952a6ac11f1b0c3f6c43620e9c05ba0e5ff586b4ddba24203b8599b0a974a869b0f9c8c000e542117c4474f81f465297725879ed51dd320fcbf49c761cb93284366c25b46d80cb67fd4f0a19dede1263a5615179ff418c8855ddd016565738484bb18d19138f3342e5aa2ecf180f80b030a646d30b1ae4edd386e9d146b52382f2ea51d3cf48b1274d2c20d9c16874e26398293085037f4c49f993a92dcdd1663c4b3d5d0e46902937ded3e6711e57ea38e0450c36a7d35af4c5f6104ab4e59767aa105da570d301dbcecb96e2ec10a48f81b7d22b1d50e613ec0078b3b87bf4b3ede0235eea9e825b297b50e8e0cd8cfe34a0b317af83b23687d67a7d764d850e8768c2ea8903b2d8ef58460ec4407c386b9a950d5327ebac684983bef2f0ebed20adb7649e5521b95e2d31dd2a9782433a42f699bdfe04ca011b9c9572e5ef6175e7d86046e098277c4ee94953120786384bc387b5193d0c6ae61fa9ed1858e24496d82cad363562b2874ec1526625953bdb4f0343843365fd7bf8154e9831b8ab89cf692dc3df68dae8902934554566c1c4f4116375a63fb59bd49b1f718f181266144a7bd0d86d3b6a9af58b766639ece50bfc248eb3c049d350163b31113a1de00d3b106c88729f7897844aba4e5bce28f11c0dbd30656d1b3712cfbe6cd46c8b82b935420cc39f2f43047b603b51c5efb7910059ed0d0ac3d07a53faa31cb78dccdf226b02ac99efe6d83f4fa11049caae16968f095caaab4a484fafd773fa1bddd243091e16a23e8a116ae8b0fa7728f279f9e0c1ad97152db5cab4d22e692a56e4a08ee4ca83c2038e42e1152fa34cdce39995228e1ed99517b573a732f1fa6bde94f586816f78832564fc784d69f9749251ce71bbfc6231c36abc161f5dfbdb3545540077daf69b3e68e50a893299dbac9b3d8fd4045005495cb98cb18c763175ddca73f64ace7ab3ad8217f1698b6555d70425b53d52c0f22dd4c218c706f99b2f66745eee18eb5f97ec61b780f1ec271ffd3f0e5c71be4da7cdad39ada1f739ce350a5d8646dca087b22205fd9d108638828b0556495c11d6e29c878f22fefd222a91cbe0f034efd23d328461c3c374b27c60c8a2a93a9bbdd7b74b21a66f1fe9986ad827408e3658f33f592bcd47fa22291d0b161bf1438c5f9b9edb9a87dc177b3bea29e7fe0d8357b307cf1c42056753c56ba1fe3f79dbc8ef9c98663766e74c6e11e665e75a5732ab13cc8607bf0680a1eecaf33675164fe998fb205d12e87388cfe92d405b5aecff5062539499334a1f0293778b0e24574780710bf9218d33650c22ee9a585b643fc4fd4ffee78e1bd7dddd6a7867cc06655c8741b7138b0d67d83d8c1313585369fdf317093c2063cc71dae62e3af8c9a40d414f5a1aebfe661af7ec9af2a2ed336ffda2b35aaf7475bff95be2fb1117ca346b12e88c5610efc770f13ee8873d1c886d9a1e228cd5eada9e31076f20e3774f656effd3e03aef00403a2e85550c33867412c37ddc19fed8f35f535df5c4c8ace4ae867c3d2eedbd3a5a206da3c8b0608d922c8736058946aef962510727736a949cfc64716aff5e5b88d67fc97dd83867467ccdf6f1a818bd31ad370a2fa6a62eaa584bc92496442d5504a15ec64961c1ed9a57f3aa2020e517e30a102d1b697bb93734271815a2c49705cdef3987eacd4eef92b7afc184e5b7054fcb029630bf692d92dc149c4755608fdc634454ce55fcd408e2fcc9633a6e4f7ecf6f73c7f9cf4c4f9121dba667752596200253d7a61cfcf5587ad26b6afc36f7ac2f9fc0e52f179025226bbf8e730e907e280834bfd067c0917bc62d1931e36bbc4a55e38f66364e880034d8f38a909f5b829af84152961ed11f494c71fe88d6520245e1276b4c91b2e677841fd0ffdb1017c9c649f534befec8344406966cf74f40503f838c904eb2c8d06a36e2e9348e39abd42e5810aee1d232a1089523945680c8f9dfd765656660c9cf584b67062b4989d17475a57a75", 0x1000}, {&(0x7f0000001140)="601e999100f96424fb48c9b2d32f944908e3246661c334ea86bdbe9f88ec84b6a00310e195ded61f5004b4d6de25c1a8e9cd125d81761563b7c72833127d03673b8cd5a52b4ddd4fefb30ebc7b6bccb2917bcaaa6acfc0d51b8e688099b0236f1df38349ed6883c4e29f3d8929bd86f4590454915cecf39d10e316a6abfdff482a06dbdb96e384907577e4f3cdf85304ba2d443cbe264848fa98a256b255720ebf21c58968008fdb489b6c811d", 0xad}, {&(0x7f0000000080)="380cf12ac386714383dbc6fb0627a670e001cc11f2db4c34d832818bcfee90a436447ff4346bc8bddaa1af1c249ca36f9b3e520a17068910432d2cf1e9d0d272dc", 0x41}, {&(0x7f0000001200)="a08a063d0ca254417f6439bd2faca95dcaf4f56d7ffbf1e2a862a46908808c3c5ab15af2b727d000b75c7543436a352c8dd42dc98782212f0a874bdf3e7682d95e6e163d66cdd1aac7873e7ed997051c8d271d440d0f12f158a9c230bc3f2d336c75ae9e3c8a0a02669c8bb2c97485dad785383b8e53c39098", 0x79}, {&(0x7f0000001280)="0623c0728375525013d132f439ea416cac5f541f94f21cb3063e75f3ba484555a8bae23f20eab2da8d4a7fc6f0965c8e730aab13ac31ed411846e833778dfbd983e4b7e68cbbd736f84591c4fcefa2a43d6f049d59624657739a6cec1d71e734e4ef914a39fb0f0b0540f21206961ba9d61ab03b3e894f582310f0381d587596fa2cddad8cb2ffca62d94cfd11321c4471640c6c7be66b2ea858330728f7e9588d2e87b97494ba3f63b4baf0abdda7aa007477dc7caaf1de7e477682c988c6ac252d9fc46639a95c21983102013d285374620bd95a2768f615cb32380b915697ca419d306616f991", 0xe8}, {&(0x7f0000001380)="87d88757224f55d12e2dd09aaae6063cdd31fbe69395eedae79d0c70bef94df34b7d1c65f3eb170456515995a354c8a8111afa932b39bfbdd696aa56d47a2e728871beaf80e27e600e8cfd3aa28d9c06fb31bd49ed0a3db416e26c0708cf80c781e39bfd19cc072ea54e0f80bad635ceba8283e4fca9920060894dff573a8a4017ea1dba123bbfca282e", 0x8a}, {&(0x7f0000001440)="83e934c00b5a9ad5d61a566e6186d149f0c667a28d8f6635b7bfb545ae1c8e4766cf5a69354a735550628ed0f3ed2aee096f533a2fce68c95a59407995c0c99371e43f89de3b81ddef7f68ab484568cc7f2d649a1e6cf761ea7837b7cbef4aec8a4d891ad3d4af048a8edbab63616474986a0db29c454e8643739e68255b84788cab9533ea", 0x85}, {&(0x7f0000001500)="a2db922ce088c251d2b607f43aa63e2afecb1a68bccbd5f8411b7dfdd2c8fca36a6ef163c56897fb702672709859796dc23edb4afdb3ee63e38c20ca3133ee6bc010b2cc833a9b762c979e6d98bd6f13618f188c9c1ba8965b92115f303683", 0x5f}], 0x8, &(0x7f0000001600)=[{0x40, 0x112, 0x2, "07a4c3ef915cfdb29453a6010695b07dfb602f7363cc1efeea13e09919cf03b0245767e90ee0822e03a0"}, {0x100, 0x11e, 0x9, "1a6fa641008653868cf7945759d8efb1c45400e8333a459d89755b71ac17034cb8eba47975a4cccfd464f74520fae457f7a0bba734979d8cdd6f6581f39402f18ec725c469cabaadc5d64b9a4df018216897fb5792cf8f0dcccc7135a9869ddcb5ca2d13fddf9be72c469c40109127f1d41ab70fd6d26641994838d07c005264579d8f80a16627f690721e7f3afa1c700675484c8a2d5eacc7a35e7e01eff043af606f4160f745a8166e14f85188553dc1923ee09d1ee5817d6975cf697e5005013c77b5980dd9a2e34edd8f7c952a6f1b41e4cb0baf45b55b3319450238ef295019d4483ea97a7b3507"}, {0x98, 0x10f, 0x80000001, "26b5d6fee2e1a055f34c9499106fa857976a575add7a2da135f24814f451814029bc5bb116da3dd49943c5b58a3633917f27ca8d458f66293f0b8314d23801294fb8082402a0bbd0bb724e0f1d2d06e08e524412f2105ac9bab1430dd4e0f712217c203f80e5c0456984f767ee45bcbe997c2006a104114ff735f544c2d4c6730dcb"}, {0x110, 0x103, 0x10001, "543f9ee66ffde3573c73623ddc8e545b70eb52b1431a8cf253eaffa6ffe121acadefa1f716d456fbc34f7533b64dc8949de46fd254aba1fe7542e8f81953be1f68606fb737845daf76a8a84fd01ca434816d051bbe614cb058783994de0da4a933a2abb6dccea3b29e7ba5b1682c63d2fc2d0d5e0855d16922a87a716594f9b1c583c4aebe5443969f50b4b7836421352b183fb32a7cb78b13fd31dec36cfa2f96b115cc31e66356d9cacf3197f55a08313839262fa5c6ed7502caf55d0a6d27b3d11bf952692c7b6a8ac9b03ea051af6cf5f070674c23427b7944e32a57840e5a337e9f1910779858d4720abd84e09b298a5a470fd791b2b8085e08e3da6f"}], 0x2e8}, 0x5}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001900)="60ea66b72de4fb97f2cb7b56d47ed6ec3f65f0050253be252b9818888fb4d9e26c0c683efb38b47b3cfc6ec3880a0081612b2afee461c57439cb9c19f0ecb1909d34bd13d16295f1cfa108007054dab0c90cffec609d469aa964958ddce087aa74e93f0a26592fd7924e725a3a4da5a18ebe5411", 0x74}], 0x1}, 0xe0da}], 0x2, 0x4000000) [ 2711.086859] audit: type=1400 audit(3225.556:80926): avc: denied { map } for pid=21230 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2711.231689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31339 sclass=netlink_route_socket pig=21256 comm=syz-executor.0 00:53:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401}]}, 0x58) [ 2711.260598] audit: type=1400 audit(3225.616:80927): avc: denied { map } for pid=21232 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x60}, [{}]}, 0x58) 00:53:46 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x5, 0xc00) write$apparmor_exec(r0, &(0x7f0000000180)={'exec ', '/proc/sys/net/ipv4/vs/sync_refresh_period\x00'}, 0x2f) r1 = socket$inet6(0xa, 0x4000000003, 0x7) setsockopt$inet6_int(r1, 0x29, 0x7e, &(0x7f00000001c0)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x22, 0xffa1) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmsg(r1, &(0x7f0000000100)={0x0, 0xfffffcf3, 0x0}, 0x2004) 00:53:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000040000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2711.404046] audit: type=1400 audit(3225.616:80928): avc: denied { map } for pid=21232 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 2711.574227] audit: type=1400 audit(3225.626:80929): avc: denied { map } for pid=21232 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) mmap$binder(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x5, 0x12, r0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x6) [ 2711.782241] audit: type=1400 audit(3225.626:80930): avc: denied { map } for pid=21232 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6c}, [{}]}, 0x58) 00:53:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480}]}, 0x58) 00:53:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:47 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f00000000c0)=""/75, 0x4b) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000001c0)) shmget$private(0x0, 0x1000, 0x100, &(0x7f0000ffd000/0x1000)=nil) userfaultfd(0x800) 00:53:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0xa, 0xffffffffffffffff, 0x80) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) lsetxattr(0x0, &(0x7f0000000340)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xe0, 0x5912, 0x0, 0x0, 0x2, 0x0, 0x100000000, 0x3ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x4, 0x9, 0x1, 0x1000, 0x0, 0x6, 0x0, 0x0, 0x5e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa600, 0x0, 0x0, 0x0, 0x0, 0x1}) ftruncate(r0, 0x1) sendfile(r1, r2, 0x0, 0x400008bca) 00:53:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}]}, 0x58) 00:53:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe0}, [{}]}, 0x58) 00:53:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = syz_open_pts(r0, 0x0) syz_open_pts(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000080)={0x3, 0x5, 0x9, 0x4, 0x7, 0x0, 0xcf}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 00:53:48 executing program 5: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x1a300}) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x800, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xffffffffffffffff}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r1, 0x8081) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000001c0)={0x0, @aes128, 0x1, "4a120177811ebf68"}) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000200)) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) fcntl$setownex(r3, 0xf, &(0x7f00000000c0)={0x0, r4}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) 00:53:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}]}, 0x58) 00:53:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x346}, [{}]}, 0x58) 00:53:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000017010000020000000100000000000000"], 0x18}], 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x1, 0x0) bind$nfc_llcp(r1, &(0x7f0000000480)={0x27, 0x0, 0x0, 0x6, 0x9, 0x2, "b5e954412b9bc2fe3aed5b2f5b9c4c478790d0c8d1b4fc34736e237aee421d1af328ced976e511f2c3ec4239f8ea3d3572e31e91d79313ded250a222bad3c1", 0x3f}, 0x60) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x5, 0x6, 0x3, 0x4, 0x9, 0x80, 0x800, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x3, 0x8, 0x91, 0xfff, 0xffffffffffffffff}}, &(0x7f00000003c0)=0xb0) r4 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x8, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000240)={r3, 0x7f, 0x7, 0x4}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r5, 0x81}, 0x8) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) accept$unix(r6, &(0x7f0000000280)=@abs, &(0x7f0000000200)=0x6e) [ 2713.600632] net_ratelimit: 20 callbacks suppressed [ 2713.600642] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.611062] protocol 88fb is buggy, dev hsr_slave_1 00:53:48 executing program 5: r0 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="9ca0fb73a3266de287a4668e205e21011ca55e04ac2a7b404f08e13927d88a9323e3d7a574f91f5f78d68942b77c122fdc75f55afd0576b608f2e8e86a", 0x3d, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)="08ea6b6843feb4a5fad9d1b7d48fb51006e3c8904e1306e98e41bb0d32ed5aa8af1ace3371aa1be9212bd2061f79896547b03611f416c275a2da6d0ba8391429cf6d1bc366da71ff8fc1c3ddf63f623cc575e39a55be3f26d2982f9b27472178844eb763ac5ad24b5ac4516ba78a92433fa4fdcae1347a5c4bad3d3bc6bf0abcc400d1b6277797bd401b3c5bd839e4b62412e8ea5ed176", 0x97, r0) [ 2713.760571] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.766256] protocol 88fb is buggy, dev hsr_slave_1 00:53:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2713.840620] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.845902] protocol 88fb is buggy, dev hsr_slave_1 00:53:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b}]}, 0x58) 00:53:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x7) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt(r2, 0x1, 0xa, &(0x7f0000000140)="f1", 0x1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x680, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffff9c, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000800)={@loopback, @empty, 0x0}, &(0x7f0000000840)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000001280)={0xff, 0x9, 0x1f, 0xb69, 0x14000, 0xcc}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000bc0)={@multicast2, @rand_addr, 0x0}, &(0x7f0000000c00)=0xc) setsockopt$inet6_udp_int(r3, 0x11, 0x6f, &(0x7f0000001200)=0x401, 0x4) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000001240)={0x10000, 0x34343452, 0x81, 0x3ff, 0x1, @stepwise={{0xffffffff80000000, 0x3}, {0x400}, {0xe73, 0x7}}}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000c40)={@initdev, @local, 0x0}, &(0x7f0000000c80)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000001100)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000cc0)={0x3d4, r4, 0x405, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r6}, {0xd0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x29c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9f2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r10}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8473}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xf4}}, {0x8}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x1, 0x0, 0x87f, 0x4}, {0x9, 0x801, 0x6f, 0x2d}, {0x0, 0x1f, 0x7, 0xed}, {0x8, 0x3f, 0x7fff, 0x6}, {0xffffffffffffffff, 0x7, 0x100000001, 0x9}, {0x2c, 0x7, 0x200, 0x5}, {0x5000, 0x6, 0x4, 0x2}, {0x9, 0x3d43, 0x2, 0x9}, {0x9, 0x0, 0x6}, {0x401, 0x13e9, 0x200, 0x9}]}}}]}}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x14}, 0x9f9eb093e2538849) r13 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x40) getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xfffffffffffffff2) sendmsg$can_bcm(r13, &(0x7f0000000440)={&(0x7f0000000340)={0x1d, r14}, 0x10, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="040000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="5aceca9a5292acf1ecb0337f70210b7f0dcf079ec06e520f856d52c470d5ace8c445b144c7bda747b4a0227bf0ff2821a6fce36b673d617606d5e53aa0d9c20a6a8a00d3bfd4da65d520d63ed4a2d352485cde741bae28"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={r13, 0xc0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x20, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x6, 0xf7f9}, 0x0, 0x0, &(0x7f00000006c0)={0x80000001, 0x4, 0x9, 0x8001}, &(0x7f0000000b00)=0x10000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r13, 0x0, 0x866e051d2037a0a1, &(0x7f00000001c0)='/dev/usbmon#\x00', r15}, 0x30) ptrace$setregs(0xd, r16, 0x1, &(0x7f0000000240)="44ab30c468ac0428b2d98ef3bc6e6810311eca2bed798ca5a74f7e2c13409ce36f40db6a85dc1390252cacc212be3cc7ef9e32bb5d012e7d452e274f2ea148e765d0870c57f3c5") 00:53:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x347}, [{}]}, 0x58) 00:53:49 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2002, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) eventfd2(0x8, 0x80000) 00:53:49 executing program 5: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1/file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file1/file0\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0bb3030bece10200d62130b85abadbe0c92e65", @ANYRES32=0x0, @ANYBLOB="040000000000000000000000000001002100000000000000b971067d9be2d7d91223c32e0db49a61b5b10b06dd7afce948bffddab48769fc931f4fe394ba79bfe3b26e7a09ee1b1bdb2c4dbeef1567da4c0fc4a970eac32dec03770fa1bb5787b97b90f930094f949570a75894028a2fef5a8a3932aec6ce7a954eb0aa9482195fb8adc663ba8fafccc56ed2314d023596ddc30206245810cd124d93826e4196c35fda6535e836b89ec670804e200c"], 0x3, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x200001, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) ioprio_set$uid(0x0, r1, 0xdaa) [ 2714.400595] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.406069] protocol 88fb is buggy, dev hsr_slave_1 00:53:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2714.480614] protocol 88fb is buggy, dev hsr_slave_0 [ 2714.486135] protocol 88fb is buggy, dev hsr_slave_1 00:53:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x58) 00:53:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x500}, [{}]}, 0x58) 00:53:50 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x5c000, 0x110) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x180, r1, 0x2, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xba2b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4c9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2c}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x53fa}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x840}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006910280000001e000a00000a791f56e799c722e4406c3d1b310e490ea78ecbebfbeef7e65ba6b2cc15a5158fc03cd77350fd075d6446ea1cc144e6bda9b111129de7000000"], &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40000000}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x401}, 0x10}, 0x21) 00:53:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 00:53:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x58) 00:53:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x600}, [{}]}, 0x58) [ 2715.367924] kauditd_printk_skb: 179 callbacks suppressed [ 2715.367939] audit: type=1400 audit(3230.576:81110): avc: denied { map } for pid=21399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2715.480849] audit: type=1400 audit(3230.576:81111): avc: denied { map } for pid=21399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:50 executing program 5: r0 = socket(0xa, 0x80005, 0x0) getsockopt(r0, 0x0, 0x41, &(0x7f0000001fac)=""/84, &(0x7f0000001000)=0x28) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') set_thread_area(&(0x7f00000000c0)={0x9, 0x20001000, 0x400, 0x1, 0x0, 0x3, 0x2, 0x0, 0xc795, 0x3ff}) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', 'nbd\x00'}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20008}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9cb466a1c5195000a00d000000000000", @ANYRES16=r1, @ANYBLOB="000426bd7000fbdbdf25010000000c00030003000000000000000c00060002000000000000000c00060003000000000000000c00030004000000000000000c0003000180000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x4004800}, 0x48800) 00:53:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000014c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000001600)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x40240002}, 0xc, &(0x7f00000015c0)={&(0x7f0000001500)={0xb4, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x400}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000844}, 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback}}) 00:53:50 executing program 0: listen(0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000100)=ANY=[], 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) [ 2715.681022] audit: type=1400 audit(3230.606:81112): avc: denied { map } for pid=21399 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x58) [ 2715.973165] audit: type=1400 audit(3230.606:81113): avc: denied { map } for pid=21399 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2716.190788] audit: type=1400 audit(3230.626:81114): avc: denied { create } for pid=21395 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:53:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x700}, [{}]}, 0x58) 00:53:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2716.403316] audit: type=1400 audit(3230.626:81115): avc: denied { write } for pid=21395 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:53:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x58) 00:53:51 executing program 5: syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0xe2e5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x400002, 0x0) ioctl$KDENABIO(r0, 0x4b36) [ 2716.585460] audit: type=1400 audit(3230.626:81116): avc: denied { read } for pid=21395 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2716.784499] audit: type=1400 audit(3230.646:81118): avc: denied { map } for pid=21399 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2716.916805] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=21439 comm=syz-executor.2 [ 2716.973342] audit: type=1400 audit(3230.646:81117): avc: denied { prog_load } for pid=21395 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:53:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa00}, [{}]}, 0x58) 00:53:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0), 0x1, 0x0, 0xfffffffffffffe8d}, 0x44001) [ 2717.130579] audit: type=1400 audit(3230.666:81119): avc: denied { map } for pid=21399 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x58) [ 2717.249274] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=42 sclass=netlink_tcpdiag_socket pig=21435 comm=syz-executor.2 00:53:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x20}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917}, 0x0) r2 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) flock(0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000180), 0x4) unshare(0x4000009c) 00:53:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r0, 0x3, 0x1, 0x0, &(0x7f00000003c0)=[0x0, 0x0], 0x2}, 0x20) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r2, 0x7, 0x1, 0x5, &(0x7f0000000140)=[0x0], 0x1}, 0x20) r3 = openat$cgroup_int(r2, &(0x7f0000000540)='pids.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x3, 0x4, 0x8, &(0x7f00000004c0)={0xffffffffffffffff}) write$cgroup_int(r3, &(0x7f0000000500)=0x6a, 0x12) r5 = openat$cgroup_type(r4, &(0x7f0000000780)='cgroup.type\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000640)={0x0, 0x70, 0xe6a7, 0x6, 0x5, 0x7, 0x0, 0xd3d, 0x88800, 0x2, 0x8, 0x7, 0x8dd, 0x8, 0x2, 0xfe8, 0xeaeb, 0x5, 0x4, 0x3, 0x20, 0x0, 0x1f2, 0x4, 0xa9, 0x7ff, 0x3, 0x6, 0x1f, 0x80000001, 0x3ff, 0x6, 0x6, 0x0, 0x4f, 0x8, 0xffffffffffff8000, 0x9, 0x0, 0x7, 0x5, @perf_config_ext={0xffff, 0x5}, 0x2000, 0x6, 0x5da6, 0x7, 0x9, 0x7, 0x7}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYRES32=r5]) openat$cgroup_type(r7, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000006c0)={0x5, 0x70, 0xd571, 0x2, 0x10000, 0x7, 0x0, 0x8800000000000, 0x80008, 0x4, 0x1ff, 0x100000000, 0x81, 0x0, 0x400, 0x20, 0xffffffffffffff7f, 0x9, 0x7, 0x6, 0xffff, 0x2e, 0x10000, 0x0, 0x0, 0x0, 0x6, 0x80, 0x0, 0x0, 0xffffffffffff7fff, 0xe42a, 0x5, 0x100000000, 0x8000, 0x1, 0xfdc, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x10001, 0x100}, 0x0, 0x1761, 0x3ff, 0x6, 0xfffffffffffffffe, 0xda0, 0x1}, 0x0, 0x7, r7, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x3, 0x1, 0xde21, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={r5, 0x0, 0x1, 0x0, 0x0, 0x377}, 0x35f) write$cgroup_int(r3, &(0x7f00000000c0)=0x2, 0x12) r8 = gettid() r9 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x1, 0x6, 0x8001, 0x8, 0x0, 0x6c54, 0x1, 0x2, 0x1, 0x3, 0x80000000, 0x6, 0x1f, 0xffffffff, 0x3, 0x937, 0x5, 0x80000000, 0x7, 0xa39a, 0x6, 0x8651, 0xc2, 0x7, 0x9, 0xfffffffffffffff7, 0x2, 0x7, 0x6, 0xffff, 0xe5d, 0xf4e5, 0xffffffff, 0x6, 0x100, 0x2, 0x0, 0xc5, 0x5, @perf_config_ext={0x8, 0x5}, 0x10001, 0xb39, 0x3, 0x5, 0x7fffffff, 0x907b, 0x7}, r8, 0xc, r1, 0x9) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x0, 0xfffffffffffffffb, 0x4, 0x400, 0x0, 0x7, 0x0, 0xd, 0x3, 0x1, 0x8d2b, 0x4, 0xfffffffffffffffd, 0x3, 0x3, 0x8, 0x101, 0xb512, 0xf1d2, 0x3f, 0x9, 0xffffffffffffff81, 0x0, 0xfff, 0x4, 0x2, 0xdaa, 0x8c, 0x3, 0x8001, 0x7, 0x10001, 0x4, 0x7, 0x7, 0x200, 0x0, 0xeeb9, 0x2, @perf_config_ext={0x8, 0x7}, 0x100, 0x5, 0xffff, 0x9, 0x1, 0x7b, 0x4}, r8, 0x1, r9, 0x0) r10 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x100000001, 0x88, 0x6, 0x2, 0x0, 0x5663, 0x20000, 0x4, 0x2, 0x8c7, 0x173, 0x5, 0x8001, 0x9, 0x0, 0x7ff, 0x81, 0x78, 0x800, 0xb156, 0x8, 0x1f, 0x40, 0x401, 0x80000000, 0x0, 0x1000, 0x401, 0x2, 0x8fa4, 0xffffffff, 0x7fff, 0x1, 0xd78, 0x7, 0x2ecd, 0x0, 0x5, 0x3, @perf_config_ext={0xfffffffffffffffb, 0x7}, 0x0, 0x0, 0x3, 0x3, 0x2, 0x10, 0x5}, r10, 0x5, r7, 0x8) 00:53:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000040000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe00}, [{}]}, 0x58) 00:53:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/sockstat6\x00') r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000500)='trustedmime_type/%.,&bdevmime_typeppp1\x00', 0x27) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000800060096000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x54) prctl$PR_SET_THP_DISABLE(0x29, 0x10000020000001) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x1fffd) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1fffffe, 0x4010, r2, 0x400000000) sendto$llc(r2, &(0x7f00000002c0)="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", 0xfa, 0x20000000, &(0x7f00000001c0)={0x1a, 0x33f, 0x0, 0xfffffffffffffff9, 0x8, 0x8126, @dev={[], 0x2b}}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x8) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000000)={0x8, 0x0, 0x40, 0x5, 0x5, 0x7, 0x7fffffff, 0x100, 0x4}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x40000007, 0x600840) mq_unlink(&(0x7f00000003c0)='/dev/admmidi#\x00') bind$llc(r3, &(0x7f0000000040)={0x1a, 0x31b, 0x7f, 0x2, 0x77, 0x3, @local}, 0x10) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/229) socket$inet_sctp(0x2, 0x1, 0x84) socket$bt_rfcomm(0x1f, 0x3, 0x3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1c00008}, 0x2fb, &(0x7f0000000540)={&(0x7f0000000480)={0x94, r4, 0x301, 0x870bd29, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x0, 0x2, [@TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL, @TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x29db1fab}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x0, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0x2}]}]}, 0xeb51eb63e3ad1a2d}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 00:53:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x58) 00:53:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') chdir(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000100)=""/33, 0x9d67734d2f9c93ea, 0x40000000, 0x0, 0xffffffffffffffcd) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 00:53:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1100}, [{}]}, 0x58) [ 2718.668108] net_ratelimit: 18 callbacks suppressed [ 2718.668153] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.679550] protocol 88fb is buggy, dev hsr_slave_1 00:53:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x58) 00:53:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x58) 00:53:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f00000001c0)={r3, 0x2, &(0x7f0000000080)=[0x3, 0x81], &(0x7f00000000c0)=[0xfffffffffffff2f3, 0x8], 0x40, 0x1, 0x7fff, &(0x7f0000000100)=[0xfff], &(0x7f0000000180)=[0x9, 0x1, 0x1, 0x40d, 0x7, 0x7]}) r4 = dup2(r1, 0xffffffffffffffff) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) [ 2719.840602] protocol 88fb is buggy, dev hsr_slave_0 [ 2719.845814] protocol 88fb is buggy, dev hsr_slave_1 00:53:55 executing program 2: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000080)) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 00:53:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2100}, [{}]}, 0x58) 00:53:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2720.000588] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.005776] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.080581] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.085805] protocol 88fb is buggy, dev hsr_slave_1 00:53:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}]}, 0x58) 00:53:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x1f00, 0x0, 0x0) 00:53:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2720.409491] kauditd_printk_skb: 178 callbacks suppressed [ 2720.409506] audit: type=1400 audit(3235.616:81298): avc: denied { map } for pid=21535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2720.419303] overlayfs: filesystem on './file0' not supported as upperdir [ 2720.590054] audit: type=1400 audit(3235.666:81299): avc: denied { map } for pid=21533 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2720.640620] protocol 88fb is buggy, dev hsr_slave_0 [ 2720.645933] protocol 88fb is buggy, dev hsr_slave_1 [ 2720.736707] audit: type=1400 audit(3235.666:81300): avc: denied { map } for pid=21533 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2720.918823] audit: type=1400 audit(3235.706:81301): avc: denied { map } for pid=21535 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f00}, [{}]}, 0x58) 00:53:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x80000001, @loopback, 0x9}, 0xffffffffffffffc4) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 00:53:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}]}, 0x58) [ 2721.085158] audit: type=1400 audit(3235.706:81302): avc: denied { map } for pid=21535 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2721.094761] Dev loop0: unable to read RDB block 15 [ 2721.170776] loop0: unable to read partition table [ 2721.176692] loop0: partition table beyond EOD, truncated [ 2721.235982] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 2721.251255] audit: type=1400 audit(3235.706:81303): avc: denied { map } for pid=21535 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3200}, [{}]}, 0x58) [ 2721.337448] __loop_clr_fd: partition scan of loop0 failed (rc=0) [ 2721.397731] audit: type=1400 audit(3235.716:81304): avc: denied { map } for pid=21533 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x4002011, r2, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x80080) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000080)={0x3, 0x5b0c}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:53:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}]}, 0x58) 00:53:56 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000000140)="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") [ 2721.545459] audit: type=1400 audit(3235.766:81305): avc: denied { map } for pid=21535 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2721.765698] audit: type=1400 audit(3235.776:81306): avc: denied { map } for pid=21533 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:57 executing program 5: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000000340)="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") 00:53:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3300}, [{}]}, 0x58) [ 2721.938390] audit: type=1400 audit(3235.836:81307): avc: denied { map } for pid=21535 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:53:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000500000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00}]}, 0x58) 00:53:58 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, 0x0) fanotify_mark(r1, 0x52, 0x10, r0, 0x0) 00:53:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:53:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4603}, [{}]}, 0x58) 00:53:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}]}, 0x58) 00:53:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000040)={0x7f, 0x2, [0x34], [0xc1]}) 00:53:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000034600000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:58 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20101, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000180)='Z', 0x1}], 0x1) 00:53:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200}]}, 0x58) 00:53:58 executing program 5: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 00:53:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4703}, [{}]}, 0x58) 00:53:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000034700000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:53:59 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c000000120021000000000000000100fe800000000000000000000000000000000000000200000014000d0000000000000000000000000000000001"], 0x1}}, 0x0) [ 2724.000603] net_ratelimit: 12 callbacks suppressed [ 2724.000613] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.010824] protocol 88fb is buggy, dev hsr_slave_1 00:53:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x58) [ 2724.160584] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.165757] protocol 88fb is buggy, dev hsr_slave_1 00:53:59 executing program 5: 00:53:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6000}, [{}]}, 0x58) [ 2724.240608] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.245779] protocol 88fb is buggy, dev hsr_slave_1 00:53:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:00 executing program 2: 00:54:00 executing program 5: 00:54:00 executing program 0: [ 2724.800614] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.805812] protocol 88fb is buggy, dev hsr_slave_1 00:54:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000}]}, 0x58) [ 2724.880609] protocol 88fb is buggy, dev hsr_slave_0 [ 2724.885792] protocol 88fb is buggy, dev hsr_slave_1 00:54:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6c00}, [{}]}, 0x58) 00:54:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000500000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:00 executing program 0: [ 2725.413021] kauditd_printk_skb: 207 callbacks suppressed [ 2725.413036] audit: type=1400 audit(3240.626:81515): avc: denied { map } for pid=21663 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:00 executing program 5: [ 2725.604607] audit: type=1400 audit(3240.626:81516): avc: denied { map } for pid=21663 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000240)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:54:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe000}, [{}]}, 0x58) [ 2725.766653] audit: type=1400 audit(3240.636:81517): avc: denied { map } for pid=21662 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000600000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000}]}, 0x58) [ 2725.909971] audit: type=1400 audit(3240.676:81518): avc: denied { map } for pid=21662 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:01 executing program 2: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/215, 0xffffff9d}], 0x1}}], 0x1, 0x0, 0x0) 00:54:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') sendfile(r2, r3, 0x0, 0x10000000000443) write(r2, &(0x7f0000000080)=')', 0x1) [ 2726.056086] audit: type=1400 audit(3240.686:81519): avc: denied { map } for pid=21663 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2726.250569] *** Guest State *** [ 2726.271247] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 2726.290568] audit: type=1400 audit(3240.716:81520): avc: denied { map } for pid=21663 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2726.375892] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 2726.475123] CR3 = 0x0000000000000000 [ 2726.500307] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 2726.522498] audit: type=1400 audit(3240.746:81521): avc: denied { map } for pid=21662 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x34000}, [{}]}, 0x58) [ 2726.572054] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2726.633920] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2726.702953] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2726.770116] audit: type=1400 audit(3240.806:81522): avc: denied { map } for pid=21662 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2726.819546] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 00:54:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}]}, 0x58) [ 2726.949251] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2726.959951] audit: type=1400 audit(3240.836:81523): avc: denied { map } for pid=21669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2727.075526] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2727.110615] audit: type=1400 audit(3240.836:81524): avc: denied { map } for pid=21669 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2727.132426] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2727.132445] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2727.132458] GDTR: limit=0x00000000, base=0x0000000000000000 [ 2727.132474] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2727.132488] IDTR: limit=0x00000000, base=0x0000000000000000 [ 2727.132506] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2727.132516] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2727.132527] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2727.132537] Interruptibility = 00000000 ActivityState = 00000000 [ 2727.132542] *** Host State *** [ 2727.132554] RIP = 0xffffffff811c9f4c RSP = 0xffff88803d2278c0 [ 2727.132574] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2727.132587] FSBase=00007fc93bf79700 GSBase=ffff8880ae800000 TRBase=fffffe0000034000 [ 2727.132598] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 2727.132612] CR0=0000000080050033 CR3=0000000043ad5000 CR4=00000000001426f0 [ 2727.132628] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff870013a0 [ 2727.132640] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2727.132646] *** Control State *** [ 2727.132654] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 2727.132662] EntryControls=0000d1ff ExitControls=002fefff [ 2727.132675] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 00:54:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2727.132686] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2727.132695] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 2727.132703] reason=80000021 qualification=0000000000000000 [ 2727.132711] IDTVectoring: info=00000000 errcode=00000000 [ 2727.132719] TSC Offset = 0xfffffa49d858b9cd [ 2727.132725] TPR Threshold = 0x00 [ 2727.132735] EPT pointer = 0x0000000094f5a01e 00:54:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}, 0x58) 00:54:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400300}, [{}]}, 0x58) 00:54:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x3}}], 0x1c) 00:54:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}]}, 0x58) 00:54:03 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:54:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000005000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) [ 2728.078778] IPVS: ftp: loaded support on port[0] = 21 00:54:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x75}, [@ldst={0x7}]}, 0x0, 0x3f3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:54:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6b6b6b}, [{}]}, 0x58) 00:54:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000}]}, 0x58) 00:54:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1000000}, [{}]}, 0x58) 00:54:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x58) 00:54:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2729.040600] net_ratelimit: 18 callbacks suppressed [ 2729.040609] protocol 88fb is buggy, dev hsr_slave_0 [ 2729.050827] protocol 88fb is buggy, dev hsr_slave_1 [ 2729.126394] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 00:54:04 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffff9c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:54:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2000000}, [{}]}, 0x58) [ 2729.222850] IPVS: ftp: loaded support on port[0] = 21 00:54:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 00:54:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) 00:54:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") membarrier(0x0, 0x0) 00:54:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000}, [{}]}, 0x58) 00:54:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) 00:54:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x5000000}, [{}]}, 0x58) 00:54:05 executing program 0: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) eventfd(0x0) io_submit(r1, 0x1, &(0x7f0000000300)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x2}]) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400100, 0x0) r3 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) unshare(0x600) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x6, 0x0, "07424a0ea015311c7227c3b6cf6e8eca17c435a81eb8c1fff4fc3bb9394c465c", 0x0, 0x0, 0x3, 0x9, 0x210}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_buf(r4, 0x0, 0x26, &(0x7f0000000200)="5688f506935199c18c7c3f184a4d9bfb2916df059f71b325b121ffdb1852cfed8cffe09a89d847120f4131c3a3be51e40cf71a7054142707985ac132e77e46bb0642b8f795fbed26f136184adc463a6eb54fe666874af528e69298ab0e6e81d413272f913acb7694f56f73e59a71e41bf23afd", 0x73) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0xa180, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x100) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380)=0x225, 0x4) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f00000003c0)=@int=0x4, 0x4) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@initdev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x88a8ffff00000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x6c000000]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) [ 2730.241656] protocol 88fb is buggy, dev hsr_slave_0 [ 2730.247872] protocol 88fb is buggy, dev hsr_slave_1 [ 2730.401631] protocol 88fb is buggy, dev hsr_slave_0 [ 2730.407980] protocol 88fb is buggy, dev hsr_slave_1 [ 2730.436852] kauditd_printk_skb: 175 callbacks suppressed [ 2730.436867] audit: type=1400 audit(3245.636:81691): avc: denied { map } for pid=21801 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2730.480579] protocol 88fb is buggy, dev hsr_slave_0 [ 2730.485784] protocol 88fb is buggy, dev hsr_slave_1 00:54:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2730.668162] audit: type=1400 audit(3245.676:81692): avc: denied { map } for pid=21801 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc008551a, &(0x7f0000000400)={0xfffffffffffffffe, 0xffffffffffffff83, 0x0, 0x0, 0x0}) 00:54:05 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f0000000000)) 00:54:06 executing program 5: 00:54:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6000000}, [{}]}, 0x58) 00:54:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) [ 2730.936330] audit: type=1400 audit(3245.716:81693): avc: denied { map } for pid=21801 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2731.040648] protocol 88fb is buggy, dev hsr_slave_0 [ 2731.164567] audit: type=1400 audit(3245.726:81694): avc: denied { map } for pid=21811 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:06 executing program 0: [ 2731.330630] audit: type=1400 audit(3245.736:81695): avc: denied { map } for pid=21801 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:06 executing program 5: 00:54:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7000000}, [{}]}, 0x58) [ 2731.520889] audit: type=1400 audit(3245.746:81696): avc: denied { map } for pid=21811 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x58) [ 2731.692528] audit: type=1400 audit(3245.756:81697): avc: denied { map } for pid=21810 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:07 executing program 2: 00:54:07 executing program 0: 00:54:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2731.897294] audit: type=1400 audit(3245.766:81698): avc: denied { map } for pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:07 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x31, 0x28, 0x9, 0x17, 0x8, 0x7f, 0x6, 0xb, 0xffffffffffffffff}}) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x40) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00'}) [ 2732.099749] audit: type=1400 audit(3245.766:81699): avc: denied { map } for pid=21807 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x58) [ 2732.249412] audit: type=1400 audit(3245.796:81700): avc: denied { map } for pid=21807 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa000000}, [{}]}, 0x58) 00:54:07 executing program 0: 00:54:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000034700000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:08 executing program 5: 00:54:08 executing program 0: 00:54:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x58) 00:54:08 executing program 2: 00:54:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe000000}, [{}]}, 0x58) 00:54:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:08 executing program 0: 00:54:08 executing program 5: 00:54:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x58) 00:54:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11000000}, [{}]}, 0x58) 00:54:08 executing program 2: 00:54:09 executing program 5: 00:54:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:09 executing program 0: 00:54:09 executing program 5: 00:54:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}]}, 0x58) 00:54:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x21000000}, [{}]}, 0x58) [ 2734.400728] net_ratelimit: 13 callbacks suppressed [ 2734.400738] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.410941] protocol 88fb is buggy, dev hsr_slave_1 00:54:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:09 executing program 0: [ 2734.560599] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.566736] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.640972] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.646140] protocol 88fb is buggy, dev hsr_slave_1 00:54:10 executing program 2: 00:54:10 executing program 5: 00:54:10 executing program 0: 00:54:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f000000}, [{}]}, 0x58) [ 2735.200582] protocol 88fb is buggy, dev hsr_slave_0 [ 2735.205784] protocol 88fb is buggy, dev hsr_slave_1 00:54:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}]}, 0x58) [ 2735.281131] protocol 88fb is buggy, dev hsr_slave_0 [ 2735.286299] protocol 88fb is buggy, dev hsr_slave_1 00:54:10 executing program 5: [ 2735.445638] kauditd_printk_skb: 196 callbacks suppressed [ 2735.445655] audit: type=1400 audit(3250.656:81888): avc: denied { map } for pid=21934 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:10 executing program 2: 00:54:10 executing program 0: [ 2735.634384] audit: type=1400 audit(3250.696:81889): avc: denied { map } for pid=21934 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2735.806211] audit: type=1400 audit(3250.726:81890): avc: denied { map } for pid=21934 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x32000000}, [{}]}, 0x58) 00:54:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}]}, 0x58) 00:54:11 executing program 5: [ 2736.041211] audit: type=1400 audit(3250.756:81891): avc: denied { map } for pid=21937 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 0: [ 2736.196277] audit: type=1400 audit(3250.776:81892): avc: denied { map } for pid=21937 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2736.344676] audit: type=1400 audit(3250.776:81893): avc: denied { map } for pid=21937 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 5: 00:54:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}]}, 0x58) [ 2736.520852] audit: type=1400 audit(3250.796:81894): avc: denied { map } for pid=21939 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:11 executing program 2: 00:54:11 executing program 0: [ 2736.697483] audit: type=1400 audit(3250.796:81895): avc: denied { map } for pid=21939 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x33000000}, [{}]}, 0x58) [ 2736.883146] audit: type=1400 audit(3250.806:81896): avc: denied { map } for pid=21937 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:12 executing program 5: 00:54:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2737.118883] audit: type=1400 audit(3250.826:81897): avc: denied { map } for pid=21939 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000}]}, 0x58) 00:54:12 executing program 0: 00:54:12 executing program 5: 00:54:12 executing program 2: 00:54:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x46030000}, [{}]}, 0x58) 00:54:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000005000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:12 executing program 0: 00:54:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x58) 00:54:13 executing program 5: 00:54:13 executing program 0: 00:54:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x47030000}, [{}]}, 0x58) 00:54:13 executing program 5: 00:54:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x58) 00:54:13 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x2997157) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dcc3055e0bcfec7be070") add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) clone(0x8000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_\x01\x00l_access\x00\xb9\xfc\xee;M\xc3&\x10w\\\xf8\x8b\xa8A6(\xccn*\xab\fb\xc4\xe8\xb3w,\xca\x1e\xa4\x86\xac8\x98l[)\v\x87\xb2^\x8d\xd5\xf0D\xe3\xc1\x87k-\xe8\xa5\xf8\xdd\x1a\x1b\x0f\xd9@\xf81ED\x84\xb6\xf4\xc4\xd5\x86\x13\xc2i\xf5\xfa\xc7\xfe', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ftruncate(r0, 0x0) 00:54:13 executing program 0: futex(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000001a00)="c4e379614832074a2be91cb9980f05f7a6aae28920aec4a37bf0c50141e2e922ebc4a2c4a11975ed1ceb262fc462cd97e649d169c421fa6f3d136c000000f2d2dec461dc57b1e67d0b25c4837916d2befa004075dbdb491e2f160f41fe4cbec5c54d0f2c718f56676beeee8f2870b63b30c4617850c8f245e0000625c483057f6e40b2c9f34cb4ba6681f9935499fa6c1fed6c310f0d7a5c5ca8271ec4647168c4c19dfb96f88e00000f3a16288836e70f8956abf2747f02000200d10499660f383ca3300a0000f3471f0f10e7e7768b8b8b27c4a27921f97cd8d8a1a12ad764cc421436224066bd0ffe383b8932d467460f3300028f6a78106f65030000004074d266413a010fa80f30ca30cac442fd21b19b0b0000fac4c19454d5ae55295529baddace582411171f200f28484c10c09d20ec463f9146115ce4f01dcdc62c9aec481f851a5bf000000f1f19ad0818194d800272dbd8feb0099df51f3f3ba22baa9a7fc85430f38079210994d0040403664644626cc4683b9080000000dc4e27d0ed241d109b2aad9c7416978474c593e40d9f50f00b11e1ef544a858639d9d43790938423fca5e06a206a219da3cb011000000e5c5c421fb5a1747ccf2400f118b7b000000c4216f5a0cdac421fd29fa002d080000007cb63e0f01d85dc402fd201d0000000064650f1b880000008141574974ecd5c4c1cdc28a0000000000c4c36d4b7b0e32c4a2750831c44109f8970000802067640fd930") 00:54:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x60000000}, [{}]}, 0x58) 00:54:14 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000}]}, 0x58) [ 2739.440646] net_ratelimit: 18 callbacks suppressed [ 2739.440695] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.450898] protocol 88fb is buggy, dev hsr_slave_1 00:54:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6b6b6b00}, [{}]}, 0x58) 00:54:15 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x4, 0x781340) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000000340)="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") 00:54:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}]}, 0x58) 00:54:15 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") syz_execute_func(&(0x7f0000000640)="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") 00:54:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6c000000}, [{}]}, 0x58) [ 2740.453997] kauditd_printk_skb: 190 callbacks suppressed [ 2740.454014] audit: type=1400 audit(3255.666:82088): avc: denied { map } for pid=22068 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2740.640648] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.645842] protocol 88fb is buggy, dev hsr_slave_1 [ 2740.653099] audit: type=1400 audit(3255.676:82089): avc: denied { syslog } for pid=22062 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:54:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x58) 00:54:16 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = msgget(0x2, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() fcntl$getownex(r0, 0x10, &(0x7f00000005c0)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000640)={{0x514d, r2, r3, r4, r5, 0x29, 0x93d3}, 0x9, 0x0, 0x1, 0x4, 0xb18de70, 0x28d5, r6, r7}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400, 0x0) ioctl$VIDIOC_DQEVENT(r8, 0x80885659, &(0x7f0000000240)={0x0, @src_change}) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r9, 0xab09, 0x5) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r10, 0x101, &(0x7f0000000180)=""/157) [ 2740.800274] audit: type=1400 audit(3255.696:82090): avc: denied { map } for pid=22070 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2740.824205] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.824272] protocol 88fb is buggy, dev hsr_slave_1 [ 2740.880584] protocol 88fb is buggy, dev hsr_slave_0 [ 2740.885795] protocol 88fb is buggy, dev hsr_slave_1 [ 2741.028329] audit: type=1400 audit(3255.706:82091): avc: denied { map } for pid=22068 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2741.233515] audit: type=1400 audit(3255.716:82092): avc: denied { map } for pid=22070 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2741.397437] audit: type=1400 audit(3255.736:82093): avc: denied { map } for pid=22068 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2741.440662] protocol 88fb is buggy, dev hsr_slave_0 [ 2741.445998] protocol 88fb is buggy, dev hsr_slave_1 [ 2741.514315] audit: type=1400 audit(3255.956:82094): avc: denied { map } for pid=22047 comm="syz-executor.5" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=300702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 2741.601895] audit: type=1400 audit(3255.976:82095): avc: denied { map } for pid=22075 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2741.633094] audit: type=1400 audit(3255.986:82096): avc: denied { map } for pid=22075 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2741.667204] audit: type=1400 audit(3255.996:82097): avc: denied { map } for pid=22075 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:17 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x13) 00:54:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x84ffffff}, [{}]}, 0x58) 00:54:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00000000000000, 0x2, 0xffffffb5}, [@ldst={0x3fd}]}, &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x7, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x10}, 0x70) 00:54:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x14) 00:54:17 executing program 0: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x111) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x6b, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) 00:54:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x88ffffff}, [{}]}, 0x58) 00:54:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r2 = open(&(0x7f0000000040)='./file2\x00', 0x8041, 0x0) fcntl$setlease(r2, 0x400, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file2\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) r8 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000a00)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x1, &(0x7f0000000a40)=[0xee01]) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) r19 = getgid() setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000b40)={{}, {0x1, 0x2}, [{0x2, 0x1, r3}, {0x2, 0x7, r4}, {0x2, 0x1, r5}, {0x2, 0x5, r6}, {0x2, 0x4, r7}, {0x2, 0x2, r8}, {0x2, 0x5, r9}], {0x4, 0x2}, [{0x8, 0x2, r10}, {0x8, 0x4, r11}, {0x8, 0x6, r12}, {0x8, 0x4, r13}, {0x8, 0x1, r14}, {0x8, 0x4, r15}, {0x8, 0x2, r16}, {0x8, 0x4, r17}, {0x8, 0x1, r18}, {0x8, 0x1, r19}], {}, {0x20, 0x4}}, 0xac, 0x1) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file2\x00') 00:54:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x3c) 00:54:19 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:19 executing program 0: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x1, 0x0, 0x0, @sint={0x7fffffff, 0x100000001}}, {0x0, 0x6, 0x0, 0x0, @msi={0x6, 0x6, 0x1}}, {0x0, 0x3, 0x0, 0x0, @adapter={0x1ff, 0x8, 0x5, 0xf5, 0x101}}, {0xfffffffffffffffa, 0x0, 0x0, 0x0, @msi={0x2, 0xe07, 0x6}}]}) r1 = gettid() futex(&(0x7f0000000040)=0x2, 0x0, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) select(0x40, &(0x7f0000000140)={0x7, 0x3, 0x0, 0xd98d, 0x6}, 0x0, 0x0, 0x0) tkill(r1, 0xd) 00:54:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe0000000}, [{}]}, 0x58) 00:54:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x224) 00:54:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c523f319bd070") futex(&(0x7f000000cffc), 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000000), 0x4000000) 00:54:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xffffff84}, [{}]}, 0x58) 00:54:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x534) 00:54:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:19 executing program 0: r0 = socket$inet(0x2, 0x80806, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) 00:54:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'nlmon0\x00'}) fstatfs(r1, &(0x7f0000000100)=""/148) fchdir(r1) 00:54:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2744.800684] net_ratelimit: 12 callbacks suppressed [ 2744.800694] protocol 88fb is buggy, dev hsr_slave_0 [ 2744.811005] protocol 88fb is buggy, dev hsr_slave_1 [ 2744.960589] protocol 88fb is buggy, dev hsr_slave_0 [ 2744.965851] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.040577] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.045843] protocol 88fb is buggy, dev hsr_slave_1 00:54:20 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:20 executing program 0: getpeername$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e23, 0x1, @rand_addr, 0x3f}, 0x3) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740)}}], 0x2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0xf6e) 00:54:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 00:54:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xffffff88}, [{}]}, 0x58) 00:54:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer2\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r1, @ANYBLOB="000025bd7000fbdbdf250e00040008ff03000000000024000e0008000600ff03000300000008000800e7860000080006000500000008000600000001000c0003000800050000000a005400030008000800f700000008000400b90200001400020076657468305f746f5f626fb60000000008000400b40d0000080004000400000014000200626f6e645f736c617665533000090000000008000100000008000500ff0700000000000000"], 0xb0}, 0x1, 0x0, 0x0, 0xf942b9a0140ca919}, 0x80) r2 = syz_open_dev$vcsa(&(0x7f0000000780)='/dev/vcsa#\x00', 0x2, 0x1112fd) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000500)) mq_open(&(0x7f00000001c0)='trustedcpusetlocgroupself{\'eth0trustednodev%*\x13loeth1[\x00', 0x133b0c48909cbf0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in=@empty, @in=@loopback, 0x4e20, 0x0, 0x4e22, 0x5, 0x2, 0x20, 0xa0, 0xff, r3, r4}, {0x1, 0x1, 0x101, 0x9, 0x1, 0x7f, 0x206, 0xff}, {0xffff, 0x400, 0x20}, 0x5, 0x6e6bb9, 0x3, 0x1, 0x2, 0x2}, {{@in6=@loopback, 0x4d6, 0x32}, 0xa, @in=@local, 0x3505, 0x0, 0x1, 0x0, 0x7f, 0x10001, 0xd1a9}}, 0xe8) mq_open(&(0x7f0000000000)='@\x00', 0x40, 0x8, &(0x7f0000000040)={0x80, 0x5, 0x745d, 0xb46, 0x100000001, 0x4, 0x5, 0x101}) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000100)={0x0, 0x9, 0x401, 0x7fffffff, 0x4b, 0x3}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') getgid() openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000580)={0x118, r5, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @local, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xff, @remote, 0x4}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x360}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40010}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x19, 0x4) [ 2745.547299] kauditd_printk_skb: 127 callbacks suppressed [ 2745.547316] audit: type=1400 audit(3260.756:82225): avc: denied { map } for pid=22194 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2745.600617] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.605862] protocol 88fb is buggy, dev hsr_slave_1 [ 2745.680615] protocol 88fb is buggy, dev hsr_slave_0 [ 2745.685832] protocol 88fb is buggy, dev hsr_slave_1 00:54:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x40030000000000}, [{}]}, 0x58) 00:54:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x20000098) [ 2745.720320] audit: type=1400 audit(3260.806:82226): avc: denied { map } for pid=22194 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2745.920240] audit: type=1400 audit(3260.806:82227): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe56, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, 0x38, 0x119, 0x0, 0x0, {}, [@typed={0x8, 0x2, @fd}]}, 0x1c}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8000, 0x0) [ 2746.072749] audit: type=1400 audit(3260.806:82228): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffdef) [ 2746.245991] audit: type=1400 audit(3260.846:82229): avc: denied { map } for pid=22194 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2746.457374] audit: type=1400 audit(3260.846:82230): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2746.660607] audit: type=1400 audit(3260.856:82231): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2746.781948] audit: type=1400 audit(3260.876:82232): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2746.988796] audit: type=1400 audit(3260.876:82233): avc: denied { map } for pid=22194 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2747.110687] audit: type=1400 audit(3260.886:82234): avc: denied { map } for pid=22205 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:22 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6b6b6b00000000}, [{}]}, 0x58) 00:54:22 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000400)={0x0, 0x0, 0x6d7b, [], 0x0}) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0xffffffffffffff62) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='\x00', &(0x7f0000000180)='/dev/uinput\x00', &(0x7f00000001c0)='\x00'], &(0x7f0000000300)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='(!&\x00']) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xff4e, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000540)=ANY=[@ANYBLOB="0180c2000000004500001c0000000000119078ac14ffbbe000000100004e21000890782e2f32f3371218a075f1f54bc1bd2d0acb9d72c9adbb46c3ec9cce81f276ad555d6330322727176643b87169f186851edcfb33148e6dc6a5bc5600c221ef832de775d98d0b2f93dde3d9d6ce0a14cf2f0a463ec76ce20d08dc01480931aa963bdc8777869cedf5a1952a545828bec73e7c731726ad022dbc49e7d0f18b3329865a0eada2027a9738616007594b51464b771107cd477f8b0136cd789313a7777ebba400"/213], 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dlm-control\x00', 0x8200, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f00000008c0)={0x7}) mkdirat(0xffffffffffffffff, 0x0, 0x8) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000440)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0100000000200000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe437dbe0fbeed61000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000035125a3500"], 0x1) r4 = syz_open_dev$vcsa(0x0, 0x5eef, 0x10002) mkdirat(r4, &(0x7f0000000140)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') futex(0x0, 0x1906e16816a1a955, 0xffffffffffffffff, 0x0, 0x0, 0x1) 00:54:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:22 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0xfffffffffffffffd) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'vcan0\x00', {0x2, 0x4e21, @multicast2}}) ioctl$PPPIOCGL2TPSTATS(r0, 0x40046104, 0x0) 00:54:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffffffffffdef) [ 2747.427915] QAT: Invalid ioctl [ 2747.447896] QAT: Invalid ioctl 00:54:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2747.480319] QAT: Invalid ioctl 00:54:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x100000000000000}, [{}]}, 0x58) [ 2747.553340] QAT: Invalid ioctl [ 2747.575430] QAT: Invalid ioctl 00:54:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) syz_execute_func(&(0x7f0000000000)="c4218163400064660f3837ecc4c15059c0f3f00fbaaecb1d0000567f4fc4e2712d08c4020196fd99400f3acccaaa2a8902000000") write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0xc1, "c923458a0004076477cae2a5e6c164becb74a2f14ecf5e25c724d38f2e08245dda2f35cf761c5ab5266920298138740da23e98d4ff30d4e3724b82b1bfbe8a9e09c8cc5ffa73e4286024f492898f5e9ee7578b0dea29da9f1de27f281d7dfbc50b64c8481df5999ec8d7e1585d38f0e583e59051e4980900c48f06625aec696af89fe1e54cb2467dacf735a0874a0dcb3db8cbfb61848824c56fd0fa29f07a438b96d2b538ca9c745e6ccfd95e47a86b342046fbd624ab68ed10810a383e93001b"}, &(0x7f00000001c0)=0xc9) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r2, 0x1, 0x9}, 0xc) [ 2747.609275] QAT: Invalid ioctl 00:54:23 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x0, "7a304a1f163f0c33"}) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTAT(r2, &(0x7f00000000c0)={0x51, 0x7d, 0x3, {0x0, 0x4a, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, '/dev/loop#\x00', 0x0, '', 0x1, '*', 0xb, '/dev/loop#\x00'}}, 0x51) sendfile(r2, r2, &(0x7f0000000140), 0x7fff) 00:54:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0xa3, 0x4, 0x2, 0x4, 0x4, 0x3f, 0x5, 0x9, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r2, 0x0, 0x5}, 0x8) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) r3 = accept4$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e, 0x80800) write$binfmt_elf32(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x936c, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x401}}, 0x38) connect$unix(r1, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 00:54:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:24 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x40000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl(r0, 0x239, 0x0) 00:54:24 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) r1 = socket$kcm(0x29, 0x2, 0x0) tee(r0, r1, 0x5, 0x3) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 00:54:24 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000600)='/dev/radio#\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/172, 0xac}], 0x1, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000040)=0x1) close(r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0xc69, 0x0, 0x3624}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000003000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) 00:54:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200000000000000}, [{}]}, 0x58) 00:54:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0xca, "f90d748b3c3886d4d0ebe35691af73f92fe409652635ad12e629c52171923b6da6d1041b3a58c6a4b7a347de60a2c49e8a33f77cada7ebf04a6e43c5cf5d11141196896f4f1697de0c68f21f4a25ef1f76e6838b807d71d04ba6df01804a160667b2d3aca61f794ee8030647b481db8138356e84de5ea7917f6d8f0b6efa44d2fd4bcee2a32b9b9bb7bcd196cf90864e9c7d7516b36a2a474cb1dea75c3dbcc6cc4e423af368093c2f27e01906f3856b0b12e62678f34a6acc533fd666a04c57d72f16e299b587752fa0"}, &(0x7f0000000000)=0xee) 00:54:24 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x0, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000002c0)=0x8, &(0x7f0000000300)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8003f1) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1800) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000000)={0x5, {0x3, 0x1, 0x1, 0xfffffffffffffffb, 0x2, 0x6}}) r3 = open(&(0x7f0000000200)='./bus\x00', 0x121401, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x1fffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000ffffffff000000000000000000000000000003000000000072463ddbf040babe73c693c7c0b4f4f05a6c46b70e7fcd9144360c4081f6b005288084bb4a82e38faa8d6f268437e75f0c1c7c134ec35d16c34dbfb4e04535ece109bcb108199da28fbeb656332928545d493f877bfd677bd3c320ddb5fcaf239d230b31408952fc22a3e933885b51392252640ca22a9470cd03212c6c374a1d1e1ecd12cebe891b5ae0f812d3a7043e9006fd5f31cbcb20b7ab377773cccd74225a89c924ca9a659d7ce451c7ea4a57af2215c034e7b9f36e0a72e055b3df2bc00fc38d50240a761c26771d90779d6c694253aad312f9"]) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) 00:54:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400000000000000}, [{}]}, 0x58) 00:54:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r2 = fcntl$getown(r0, 0x9) syz_open_procfs(r2, &(0x7f0000000000)='net/snmp6\x00') 00:54:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x500000000000000}, [{}]}, 0x58) [ 2749.840604] net_ratelimit: 18 callbacks suppressed [ 2749.840614] protocol 88fb is buggy, dev hsr_slave_0 [ 2749.850842] protocol 88fb is buggy, dev hsr_slave_1 [ 2750.566498] kauditd_printk_skb: 137 callbacks suppressed [ 2750.566515] audit: type=1400 audit(3265.776:82372): avc: denied { map } for pid=22336 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.769260] audit: type=1400 audit(3265.976:82373): avc: denied { map } for pid=22337 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:26 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) [ 2750.909071] audit: type=1400 audit(3266.116:82374): avc: denied { map } for pid=22338 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2750.981765] audit: type=1400 audit(3266.166:82375): avc: denied { map } for pid=22338 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2751.010094] audit: type=1400 audit(3266.166:82376): avc: denied { map } for pid=22338 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2751.040590] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.045912] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.060874] audit: type=1400 audit(3266.196:82377): avc: denied { map } for pid=22339 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2751.130677] audit: type=1400 audit(3266.206:82378): avc: denied { map } for pid=22339 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2751.190685] audit: type=1400 audit(3266.226:82379): avc: denied { map } for pid=22339 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2751.200608] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.219767] protocol 88fb is buggy, dev hsr_slave_1 00:54:26 executing program 2: r0 = creat(0x0, 0x3) connect$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f0000000500)=ANY=[], 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x2, @remote, 0x4e20, 0x0, 'lc\x00', 0x10, 0x1fff, 0x55}, 0x2c) r2 = perf_event_open(&(0x7f00000005c0)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x101000003) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000001c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) close(r2) 00:54:26 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x2000000000000000, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x100082) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) r2 = memfd_create(&(0x7f0000000000)='\\eth0mime_type$%\x00', 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 00:54:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000050000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x600000000000000}, [{}]}, 0x58) 00:54:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) close(r0) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r2, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 2751.280572] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.285735] protocol 88fb is buggy, dev hsr_slave_1 00:54:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x700000000000000}, [{}]}, 0x58) 00:54:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:26 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000014c0)='/dev/audio#\x00', 0x8001, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001640)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001600)={&(0x7f0000001580)=@mpls_newroute={0x80, 0x18, 0x4, 0x70bd26, 0x25dfdbfc, {0x1c, 0x34, 0x20, 0x7ff, 0xff, 0x0, 0xfd, 0x7, 0x1000}, [@RTA_DST={0x18, 0x1, [{0x7fffffff, 0x15e, 0x8, 0x5}, {0x3, 0x2, 0x6, 0x4}, {0x3, 0x3, 0x6, 0x4}, {0x1f, 0x8, 0x1000, 0xf6a5}, {0x1, 0xabe3, 0x2, 0xffffffffffff0000}]}, @RTA_DST={0x20, 0x1, [{0x8, 0x10001, 0x800, 0xffffffff}, {0x9ca4, 0x5, 0x7, 0x9}, {0x3f, 0x5, 0x3, 0x4}, {0x1f, 0x0, 0x20, 0xfffffffffffeffff}, {0x7, 0x4, 0x2, 0x458}, {0x2, 0xa9c, 0x1, 0x100000000}, {0x80, 0x6, 0x0, 0x7}]}, @RTA_DST={0x10, 0x1, [{0xa616, 0x81, 0x6, 0x2f}, {0x94, 0x2, 0x1000, 0x6}, {0x66d, 0x0, 0xfffffffffffffffb, 0xc2}]}, @RTA_OIF={0x8, 0x4, r1}, @RTA_DST={0xc, 0x1, [{0x80, 0x5, 0xffffffff, 0x7}, {0x1, 0x9, 0xfff, 0x7f}]}, @RTA_DST={0x8, 0x1, [{0x40, 0x5, 0x9, 0xffffffff80000001}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x4000) accept4$tipc(r0, 0x0, &(0x7f00000017c0), 0x80800) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x404000, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001800)=""/4096) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x30003, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="470300003500290500000000000000000200000018000000000000000001"], 0xfd5a}}, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200400, 0x0) sendmmsg$alg(r4, &(0x7f0000000440)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="3420aba426b4a39c4ce15cecad1eef9dacc784efea898258f0c4f0c63433eb4242492ecddf60043c9b1f22759de4de18cb6195d5297fdd858cad843a76d0eac6663a982da373458f8d2082f26999ce9a864417fb6b8d227ca2c05df34d63908b9362194777d091e0d917b64f1027f00505c27822e156e79200ca78a42159b09a6a53bd3e9846d857aa66c678b871bcdc01cb63fd4b26e56f33d0ac48f34b78f4fbab51b3eea06e7889637f0726721227c7", 0xb1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1b0, 0x1}], 0x1, 0x40) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000001680)=""/193, &(0x7f0000001780)=0xc1) 00:54:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) accept$packet(r1, &(0x7f0000000000), &(0x7f0000000040)=0x14) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) [ 2751.840604] protocol 88fb is buggy, dev hsr_slave_0 [ 2751.845928] protocol 88fb is buggy, dev hsr_slave_1 [ 2751.881925] audit: type=1400 audit(3267.096:82380): avc: denied { map } for pid=22357 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2752.028753] audit: type=1400 audit(3267.116:82381): avc: denied { map } for pid=22357 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xa00000000000000}, [{}]}, 0x58) 00:54:28 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="0cdac2f03f03fe3a4014c0b013afd253f51b5801768d44afd9368c1db95b1d615f48f3ce2624c65aa4"]) 00:54:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xe00000000000000}, [{}]}, 0x58) 00:54:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x240000) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x200, 0x7}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2}, 0x8) r3 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) write$binfmt_elf32(r3, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 00:54:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xeba, 0x8800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) sched_setattr(r2, &(0x7f0000000080)={0x30, 0x1, 0x1, 0x9, 0x8bda, 0xffffffff, 0xfff}, 0x0) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="3d4929b54a27adaea9d152877f454c46000000000032000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000040000000000000000000f71ad518f98db65b9e2153300f50b5cb499e0ec344d0385754817dd40c0713a3067a31f81ea90424647639fe3ea2d1959b9f6808f2dd0b9c423485120b95d0fd27ddf0a14e7c7c672cf6243fd26c359c9dba0664f3fed2d4724a1689a290a1993bd57f8189f592ee9d571a0513babc0056caf9c722625fdb640e24802edf0dcdc3d1bd0ab323fbbeaa71f2f3ab6f9b92817074"], 0x58) 00:54:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1100000000000000}, [{}]}, 0x58) [ 2753.926587] EXT4-fs (sda1): Unrecognized mount option " ?:@SXvD6[a_H&$Z" or missing value [ 2755.200624] net_ratelimit: 12 callbacks suppressed [ 2755.200635] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.210814] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.304211] IPVS: ftp: loaded support on port[0] = 21 [ 2755.360578] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.365748] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.440635] protocol 88fb is buggy, dev hsr_slave_0 [ 2755.445831] protocol 88fb is buggy, dev hsr_slave_1 [ 2755.549559] chnl_net:caif_netlink_parms(): no params data found [ 2755.739972] bridge0: port 1(bridge_slave_0) entered blocking state [ 2755.746701] bridge0: port 1(bridge_slave_0) entered disabled state [ 2755.754758] device bridge_slave_0 entered promiscuous mode [ 2756.000612] protocol 88fb is buggy, dev hsr_slave_0 [ 2756.005968] protocol 88fb is buggy, dev hsr_slave_1 [ 2756.062459] bridge0: port 2(bridge_slave_1) entered blocking state [ 2756.069030] bridge0: port 2(bridge_slave_1) entered disabled state [ 2756.077102] device bridge_slave_1 entered promiscuous mode [ 2756.090590] protocol 88fb is buggy, dev hsr_slave_0 [ 2756.095738] protocol 88fb is buggy, dev hsr_slave_1 [ 2756.111318] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2756.119760] device bridge_slave_1 left promiscuous mode [ 2756.125735] bridge0: port 2(bridge_slave_1) entered disabled state [ 2756.171821] device bridge_slave_0 left promiscuous mode [ 2756.177593] bridge0: port 1(bridge_slave_0) entered disabled state [ 2760.334018] device hsr_slave_1 left promiscuous mode [ 2760.399753] device hsr_slave_0 left promiscuous mode [ 2760.434727] team0 (unregistering): Port device team_slave_1 removed [ 2760.449944] team0 (unregistering): Port device team_slave_0 removed [ 2760.461603] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2760.497693] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2760.599356] bond0 (unregistering): Released all slaves [ 2760.645568] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2760.673822] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2760.683144] team0: Port device team_slave_0 added [ 2760.689143] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2760.697005] team0: Port device team_slave_1 added [ 2760.702939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2760.710859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2760.785024] device hsr_slave_0 entered promiscuous mode [ 2760.851024] device hsr_slave_1 entered promiscuous mode [ 2760.931647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2760.938885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2760.957072] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2761.076072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2761.097632] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2761.119857] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2761.137413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2761.156872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2761.176949] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2761.189692] 8021q: adding VLAN 0 to HW filter on device team0 [ 2761.215143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2761.229732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2761.255161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2761.270078] bridge0: port 1(bridge_slave_0) entered blocking state [ 2761.276590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2761.295773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2761.310073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2761.327725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2761.340147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2761.358324] bridge0: port 2(bridge_slave_1) entered blocking state [ 2761.364850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2761.383919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2761.399969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2761.423192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2761.440646] net_ratelimit: 16 callbacks suppressed [ 2761.440659] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.450908] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.459838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2761.467433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2761.476957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2761.485840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2761.496644] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2761.508574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2761.535497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2761.552983] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2761.565044] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2761.571990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2761.580276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2761.598254] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2761.600584] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.609581] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.614622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2761.627391] kauditd_printk_skb: 51 callbacks suppressed [ 2761.627406] audit: type=1400 audit(3276.836:82433): avc: denied { map } for pid=22417 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.680565] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.680587] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.685724] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.695940] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.704647] audit: type=1400 audit(3276.886:82434): avc: denied { map } for pid=22418 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.745560] audit: type=1400 audit(3276.936:82435): avc: denied { map } for pid=22418 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.796518] audit: type=1400 audit(3276.996:82436): avc: denied { map } for pid=22419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.820644] protocol 88fb is buggy, dev hsr_slave_0 [ 2761.825937] protocol 88fb is buggy, dev hsr_slave_1 [ 2761.835771] audit: type=1400 audit(3277.046:82437): avc: denied { map } for pid=22420 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2761.969152] audit: type=1400 audit(3277.176:82438): avc: denied { map } for pid=22421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0xe, &(0x7f0000000d80)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/167, 0xa7}], 0x3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0), 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getgid() 00:54:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000040)={0x9, 0x7, 0x401, 'queue0\x00', 0x1}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000000032000000000000000000000000000000000000380000000000000000000000000020200000000000000000000000000000000000000000e6ffffff0000002f92140686c10d3b8a5df3000000000000000000000000000000000032d3cb82be985fc0aec2f1032ed8f9023df1d084965b1c2cc9e80198f6d622a203802fdaf119006c61c966c7277e125b671763bd739d1f32f6331aedfdbc789b1bd56f0b563a7f89b8d8fc4d7214ae"], 0x58) 00:54:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2100000000000000}, [{}]}, 0x58) 00:54:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r0, 0x102) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0011000000000000c910ff81000000000000000000000000000106676adbf6e72d578fa3b9478a9fee70b821e3a83e7a4bbeb6987727eef6e7a06af246d1ed4ab0e83ab50c4f3d762640584360b8573834f9227457ffe8044f7eb1b0b2179ffd219e61aadb0673c33679f62a2204d0e2bac1650984743a66aa9dc20400000002c204000000cc01010004010100"/152], 0x98) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 00:54:37 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) [ 2762.019486] audit: type=1400 audit(3277.206:82439): avc: denied { map } for pid=22421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2762.212838] sctp: [Deprecated]: syz-executor.0 (pid 22431) Use of int in max_burst socket option deprecated. [ 2762.212838] Use struct sctp_assoc_value instead 00:54:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) [ 2762.265740] audit: type=1400 audit(3277.476:82440): avc: denied { map } for pid=22434 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@rand_addr=0x27540a53, @broadcast}, 0x8) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000032000000d8000000000000000000e5589d23a4b967753800000000a5fa002000"/89], 0x58) 00:54:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f00000000000000}, [{}]}, 0x58) [ 2762.407091] audit: type=1400 audit(3277.526:82441): avc: denied { map } for pid=22434 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:37 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @remote, 0x1}, [@null, @rose, @null, @null, @rose, @rose, @netrom]}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xf269, 0x400000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x8, 0x9, 0x1}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x6, 0x3d0}, 0x8) [ 2762.613829] audit: type=1400 audit(3277.706:82442): avc: denied { map } for pid=22441 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:54:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000034700000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3200000000000000}, [{}]}, 0x58) [ 2762.956136] sctp: [Deprecated]: syz-executor.0 (pid 22431) Use of int in max_burst socket option deprecated. [ 2762.956136] Use struct sctp_assoc_value instead 00:54:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4600000000002748debc3200000000000000000000000000000000000038000000000000000000000000002000"/88], 0x58) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f00000000c0)=0xfc000000000000) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000140)={0x1, 0x0, 0x103, 0x5, {0x1, 0x7, 0x7ff, 0x2}}) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x100, 0x200) tee(r1, r0, 0x5, 0x1) 00:54:38 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2001, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)={0x130, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffff0fb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc189}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x262c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xac}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x832}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x4080}, 0x8810) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0xfd, 0x4, 0x4}}, 0x14) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000640)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x78, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8fa}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x101}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x1, 0x2]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7f}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x9, 0xf5, 0x1, 0xffffffff7fffffff]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x800}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000004}, 0x4010) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0}}], 0x0, 0x0, 0x0}) 00:54:38 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aa"], 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x800) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x81, 0x8000) bind$tipc(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000080)}, 0x45) 00:54:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000010000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e72300000000000000000000000000079616d300000000000000000000000007465616d30000000000000000000000076657468315f746f5f7465616d0000000180c2200000000000000000aaaaaaaaaa000000000000000000e0000000e0000000100100007374700000000000000000000000000000000000000000000000000000000000480000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000bbd100005a49540000000000000000000000000000000000000000000000000001000800000200"/416]}, 0x218) 00:54:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3300000000000000}, [{}]}, 0x58) [ 2763.505225] binder_alloc: 22463: binder_alloc_buf, no vma [ 2763.545497] binder: 22463:22473 transaction failed 29189/-3, size 0-0 line 2970 [ 2763.646254] binder: undelivered TRANSACTION_ERROR: 29189 00:54:39 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x400012, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 00:54:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f450c4600000000043200000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000003bf5d29bb6090012e5fe36505a270000"], 0x58) 00:54:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, &(0x7f0000000200)=""/112) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000080)={{0x1, @addr=0xffffffffffffff47}, 0x8, 0x400040000, 0x3}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') fcntl$notify(r0, 0x402, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 00:54:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x2761, 0x0) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="a038d7e3827719e773ee03a2fd7f9dba7c7f45471c4f1abf05893a761a754dd0acb3cc9d94f2ed1918d0f44aba92b2933d26b73b081c7657ea2d1e11a53dee395f55b0ab822d44", 0x47}], 0x1, 0x3) fcntl$setlease(r0, 0x400, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0xc4100) poll(&(0x7f00000001c0)=[{}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x83}) 00:54:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4603000000000000}, [{}]}, 0x58) 00:54:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/416]}, 0x218) 00:54:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2, 0x1, 0x30}, 0xc) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000003200000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000f605a23bae010e1236cc12581f336200000000000000"], 0x58) 00:54:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000280)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0xfffffffffffffed5) r4 = accept4$alg(r3, 0x0, 0x0, 0x800) sendfile(r4, r3, 0x0, 0x7ffff000) 00:54:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4703000000000000}, [{}]}, 0x58) 00:54:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setrlimit(0x40000000000008, &(0x7f0000000040)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 00:54:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0xfd7a) socket$nl_route(0x10, 0x3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3200, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 2765.472616] WARNING: CPU: 0 PID: 30266 at net/xfrm/xfrm_state.c:2391 xfrm_state_fini+0x218/0x280 [ 2765.481607] Kernel panic - not syncing: panic_on_warn set ... [ 2765.481607] [ 2765.489013] CPU: 0 PID: 30266 Comm: kworker/u4:4 Not tainted 4.19.37 #5 [ 2765.495795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.505289] Workqueue: netns cleanup_net [ 2765.509452] Call Trace: [ 2765.512120] dump_stack+0x172/0x1f0 [ 2765.515871] panic+0x263/0x51d [ 2765.519115] ? __warn_printk+0xf3/0xf3 [ 2765.523067] ? xfrm_state_fini+0x218/0x280 [ 2765.527424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2765.533010] ? __warn.cold+0x5/0x54 [ 2765.536693] ? __warn+0xe8/0x1d0 [ 2765.540096] ? xfrm_state_fini+0x218/0x280 [ 2765.544385] __warn.cold+0x20/0x54 [ 2765.547960] ? xfrm_state_fini+0x218/0x280 [ 2765.552225] report_bug+0x263/0x2b0 [ 2765.555958] do_error_trap+0x204/0x360 [ 2765.559883] ? math_error+0x340/0x340 [ 2765.563803] ? find_held_lock+0x35/0x130 [ 2765.567964] ? error_entry+0x76/0xd0 [ 2765.571934] ? trace_hardirqs_off_caller+0x65/0x220 [ 2765.576982] ? _raw_spin_unlock_bh+0x31/0x40 [ 2765.581492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2765.586405] do_invalid_op+0x1b/0x20 [ 2765.590155] invalid_op+0x14/0x20 [ 2765.593647] RIP: 0010:xfrm_state_fini+0x218/0x280 [ 2765.598536] Code: 41 5e 5d c3 e8 a9 15 7c fb 0f 0b e9 09 ff ff ff e8 9d 15 7c fb 0f 0b e9 68 ff ff ff e8 91 15 7c fb 0f 0b eb c6 e8 88 15 7c fb <0f> 0b e9 52 fe ff ff e8 1c 77 b2 fb e9 75 fe ff ff e8 32 77 b2 fb [ 2765.617477] RSP: 0018:ffff8880312f7bd0 EFLAGS: 00010293 [ 2765.622880] RAX: ffff8880a5012100 RBX: ffff8880a879c400 RCX: ffffffff85ee2b19 [ 2765.630192] RDX: 0000000000000000 RSI: ffffffff85ef31f8 RDI: 0000000000000005 [ 2765.637501] RBP: ffff8880312f7bf0 R08: ffff8880a5012100 R09: ffff8880a50129f0 [ 2765.644812] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a879df40 [ 2765.652111] R13: ffff8880312f7cc8 R14: ffffffff891b7078 R15: dffffc0000000000 [ 2765.659439] ? xfrm_state_flush+0x5a9/0x660 [ 2765.663805] ? xfrm_state_fini+0x218/0x280 [ 2765.668102] ? xfrm_policy_fini+0x2b0/0x2b0 [ 2765.672468] xfrm_net_exit+0x25/0x70 [ 2765.676244] ops_exit_list.isra.0+0xb0/0x160 [ 2765.680690] cleanup_net+0x3fb/0x960 [ 2765.684442] ? unregister_pernet_device+0x80/0x80 [ 2765.689309] ? __lock_is_held+0xb6/0x140 [ 2765.693410] process_one_work+0x98e/0x1760 [ 2765.697684] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2765.702385] ? lock_acquire+0x16f/0x3f0 [ 2765.706448] ? kasan_check_write+0x14/0x20 [ 2765.710702] ? do_raw_spin_lock+0xc8/0x240 [ 2765.714955] worker_thread+0x98/0xe40 [ 2765.718833] kthread+0x357/0x430 [ 2765.722229] ? process_one_work+0x1760/0x1760 [ 2765.726746] ? kthread_delayed_work_timer_fn+0x290/0x290 [ 2765.732213] ret_from_fork+0x3a/0x50 [ 2765.737231] Kernel Offset: disabled [ 2765.741219] Rebooting in 86400 seconds..