Warning: Permanently added '[localhost]:41883' (ED25519) to the list of known hosts. [ 191.079058][ T29] audit: type=1400 audit(190.710:58): avc: denied { name_bind } for pid=3163 comm="sshd" src=30001 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 191.535932][ T29] audit: type=1400 audit(191.170:59): avc: denied { execute } for pid=3165 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 191.541256][ T29] audit: type=1400 audit(191.170:60): avc: denied { execute_no_trans } for pid=3165 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:03:12 fuzzer started [ 198.179285][ T29] audit: type=1400 audit(197.810:61): avc: denied { node_bind } for pid=3165 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 198.255003][ T29] audit: type=1400 audit(197.860:62): avc: denied { name_bind } for pid=3165 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:03:17 dialing manager at localhost:30001 [ 209.361648][ T29] audit: type=1400 audit(208.990:63): avc: denied { mounton } for pid=3176 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 209.388885][ T29] audit: type=1400 audit(209.020:64): avc: denied { mount } for pid=3176 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 209.461721][ T3176] cgroup: Unknown subsys name 'net' [ 209.512306][ T29] audit: type=1400 audit(209.140:65): avc: denied { unmount } for pid=3176 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 210.076467][ T3176] cgroup: Unknown subsys name 'rlimit' [ 210.514487][ T29] audit: type=1400 audit(210.140:66): avc: denied { mounton } for pid=3176 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 210.523005][ T29] audit: type=1400 audit(210.150:67): avc: denied { mount } for pid=3176 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 210.555854][ T29] audit: type=1400 audit(210.180:68): avc: denied { setattr } for pid=3176 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 211.060016][ T3183] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 211.072221][ T29] audit: type=1400 audit(210.700:69): avc: denied { relabelto } for pid=3183 comm="mkswap" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.078389][ T29] audit: type=1400 audit(210.710:70): avc: denied { write } for pid=3183 comm="mkswap" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.205041][ T29] audit: type=1400 audit(210.830:71): avc: denied { read } for pid=3176 comm="syz-executor" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.208280][ T29] audit: type=1400 audit(210.830:72): avc: denied { open } for pid=3176 comm="syz-executor" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.252202][ T3176] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:30 syscalls: 3118 1970/01/01 00:03:30 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:03:30 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:03:30 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:03:30 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:03:30 setuid sandbox: enabled 1970/01/01 00:03:30 namespace sandbox: enabled 1970/01/01 00:03:30 Android sandbox: enabled 1970/01/01 00:03:30 fault injection: enabled 1970/01/01 00:03:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:03:30 net packet injection: enabled 1970/01/01 00:03:30 net device setup: enabled 1970/01/01 00:03:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:03:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:03:30 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:03:30 USB emulation: enabled 1970/01/01 00:03:30 hci packet injection: /dev/vhci does not exist 1970/01/01 00:03:30 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:03:30 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:03:30 swap file: enabled 1970/01/01 00:03:31 starting 2 executor processes [ 217.650174][ T3186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.748178][ T3186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.957747][ T3188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.030058][ T3188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.400798][ T3186] hsr_slave_0: entered promiscuous mode [ 220.467412][ T3186] hsr_slave_1: entered promiscuous mode [ 220.929352][ T3188] hsr_slave_0: entered promiscuous mode [ 220.977186][ T3188] hsr_slave_1: entered promiscuous mode [ 221.016368][ T3188] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 221.018487][ T3188] Cannot create hsr debugfs directory [ 222.984531][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 222.984738][ T29] audit: type=1400 audit(222.610:81): avc: denied { create } for pid=3186 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.011543][ T29] audit: type=1400 audit(222.610:82): avc: denied { write } for pid=3186 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.012490][ T29] audit: type=1400 audit(222.640:83): avc: denied { read } for pid=3186 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.101643][ T3186] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 223.230105][ T3186] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 223.288542][ T3186] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 223.398302][ T3186] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 223.689234][ T3188] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 223.708728][ T3188] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 223.778786][ T3188] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 223.841041][ T3188] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 225.967214][ T3186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.457228][ T3188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.369093][ T3186] veth0_vlan: entered promiscuous mode [ 234.420555][ T3186] veth1_vlan: entered promiscuous mode [ 234.677195][ T3186] veth0_macvtap: entered promiscuous mode [ 234.779335][ T3186] veth1_macvtap: entered promiscuous mode [ 234.851985][ T3188] veth0_vlan: entered promiscuous mode [ 234.977321][ T3188] veth1_vlan: entered promiscuous mode [ 235.260397][ T3186] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.262574][ T3186] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.270388][ T3186] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.271398][ T3186] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 235.639420][ T3188] veth0_macvtap: entered promiscuous mode [ 235.880476][ T3188] veth1_macvtap: entered promiscuous mode [ 236.015077][ T29] audit: type=1400 audit(235.640:84): avc: denied { mounton } for pid=3186 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 236.102736][ T29] audit: type=1400 audit(235.730:85): avc: denied { mount } for pid=3186 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 236.498687][ T3188] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 236.499242][ T3188] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 236.499592][ T3188] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 236.500106][ T3188] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:03:56 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40001) [ 237.165598][ T29] audit: type=1400 audit(236.790:86): avc: denied { read write } for pid=3186 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 237.200055][ T29] audit: type=1400 audit(236.810:87): avc: denied { open } for pid=3186 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 237.227781][ T29] audit: type=1400 audit(236.850:88): avc: denied { ioctl } for pid=3186 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 00:03:57 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, 0x0) 00:03:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) [ 238.329734][ T29] audit: type=1400 audit(237.960:89): avc: denied { create } for pid=3323 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 238.365743][ T29] audit: type=1400 audit(237.980:90): avc: denied { ioctl } for pid=3323 comm="syz-executor.0" path="socket:[3738]" dev="sockfs" ino=3738 ioctlcmd=0x3b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 00:03:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1a, 0x0, &(0x7f00000003c0)) [ 239.179139][ T29] audit: type=1400 audit(238.800:91): avc: denied { read } for pid=3327 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 239.189921][ T29] audit: type=1400 audit(238.800:92): avc: denied { open } for pid=3327 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 239.260176][ T29] audit: type=1400 audit(238.890:93): avc: denied { ioctl } for pid=3327 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 00:03:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:03:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40001) 00:03:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40001) 00:04:00 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, 0x0) 00:04:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14}, 0x14}}, 0x40001) 00:04:01 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:01 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, 0x0) 00:04:01 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, 0x0) 00:04:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:03 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1a, 0x0, &(0x7f00000003c0)) 00:04:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, 0x0) 00:04:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, 0x0) 00:04:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1a, 0x0, &(0x7f00000003c0)) 00:04:04 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$P9_RMKDIR(r1, 0x0, 0x0) 00:04:04 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$P9_RMKDIR(r1, 0x0, 0x0) 00:04:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r2, 0x4004ae8b, 0x0) 00:04:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r2, 0x4004ae8b, 0x0) [ 246.133290][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 246.144909][ T29] audit: type=1400 audit(245.760:96): avc: denied { read } for pid=3367 comm="syz-executor.1" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 246.146528][ T29] audit: type=1400 audit(245.760:97): avc: denied { open } for pid=3367 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 246.148185][ T29] audit: type=1400 audit(245.770:98): avc: denied { ioctl } for pid=3367 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 00:04:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:04:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$P9_RMKDIR(r1, 0x0, 0x0) 00:04:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1a, 0x0, &(0x7f00000003c0)) 00:04:07 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="03", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 249.105846][ T29] audit: type=1400 audit(248.700:99): avc: denied { create } for pid=3378 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 249.187274][ T29] audit: type=1400 audit(248.820:100): avc: denied { bind } for pid=3378 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 249.188765][ T29] audit: type=1400 audit(248.820:101): avc: denied { name_bind } for pid=3378 comm="syz-executor.1" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 249.190009][ T29] audit: type=1400 audit(248.820:102): avc: denied { node_bind } for pid=3378 comm="syz-executor.1" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 249.308031][ T29] audit: type=1400 audit(248.930:103): avc: denied { write } for pid=3378 comm="syz-executor.1" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 249.339808][ T29] audit: type=1400 audit(248.960:104): avc: denied { connect } for pid=3378 comm="syz-executor.1" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 249.364892][ T29] audit: type=1400 audit(248.990:105): avc: denied { name_connect } for pid=3378 comm="syz-executor.1" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 00:04:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:04:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r2, 0x4004ae8b, 0x0) 00:04:09 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x20000000) write$P9_RMKDIR(r1, 0x0, 0x0) 00:04:10 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup(r0) ioctl$KVM_CAP_EXIT_ON_EMULATION_FAILURE(r1, 0x4068aea3, 0x0) 00:04:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="03", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:04:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0xd19972dcbbeb28ea) [ 252.744979][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 252.745185][ T29] audit: type=1400 audit(252.370:107): avc: denied { watch } for pid=3391 comm="syz-executor.1" path="/syzkaller-testdir741042236/syzkaller.YRz17B/15" dev="vda" ino=1744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 00:04:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r2, 0x4004ae8b, 0x0) 00:04:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000080)) [ 253.405510][ T29] audit: type=1400 audit(253.020:108): avc: denied { create } for pid=3395 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 253.427882][ T29] audit: type=1400 audit(253.060:109): avc: denied { getopt } for pid=3395 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:04:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='schedstat\x00') name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 00:04:13 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) write$UHID_DESTROY(r1, 0x0, 0x0) 00:04:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000080)) [ 254.604508][ T29] audit: type=1400 audit(254.220:110): avc: denied { read } for pid=3399 comm="syz-executor.0" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 254.630907][ T29] audit: type=1400 audit(254.220:111): avc: denied { open } for pid=3399 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 254.681102][ T29] audit: type=1400 audit(254.310:112): avc: denied { ioctl } for pid=3399 comm="syz-executor.0" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 00:04:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="03", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:04:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) write$UHID_DESTROY(r1, 0x0, 0x0) 00:04:15 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r1, 0x40044104, &(0x7f0000000080)) 00:04:16 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r1, 0x40044104, &(0x7f0000000080)) 00:04:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000080)) 00:04:16 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockname$unix(r0, 0x0, &(0x7f0000000180)) 00:04:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='schedstat\x00') name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 00:04:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x5, 0x0, 0x0) 00:04:18 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)) [ 258.905041][ T29] audit: type=1400 audit(258.530:113): avc: denied { setopt } for pid=3417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:04:18 executing program 1: keyctl$KEYCTL_PKEY_VERIFY(0x14, 0x0, 0x0, 0x0, 0x0) 00:04:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) 00:04:19 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) [ 260.479229][ T29] audit: type=1400 audit(260.100:114): avc: denied { prog_load } for pid=3424 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 260.480715][ T29] audit: type=1400 audit(260.100:115): avc: denied { bpf } for pid=3424 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 260.481813][ T29] audit: type=1400 audit(260.110:116): avc: denied { perfmon } for pid=3424 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 260.636310][ T29] audit: type=1400 audit(260.250:117): avc: denied { read write } for pid=3424 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 260.639847][ T29] audit: type=1400 audit(260.260:118): avc: denied { open } for pid=3424 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 260.672408][ T29] audit: type=1400 audit(260.280:119): avc: denied { mounton } for pid=3424 comm="syz-executor.0" path="/syzkaller-testdir1500852059/syzkaller.IFFTfU/25/file0" dev="vda" ino=1749 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 260.835079][ T29] audit: type=1400 audit(260.460:120): avc: denied { create } for pid=3426 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 260.866012][ T29] audit: type=1400 audit(260.480:121): avc: denied { write } for pid=3426 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 260.942651][ T29] audit: type=1400 audit(260.570:122): avc: denied { mount } for pid=3424 comm="syz-executor.0" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 00:04:20 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_CONNECTINFO(r0, 0x80045505, &(0x7f0000000000)) [ 261.770493][ T3430] usb usb1: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 00:04:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)) 00:04:22 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r0, r1, 0x0) bind$unix(r1, &(0x7f0000000000)=@abs={0x1}, 0x6e) 00:04:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 00:04:23 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)) 00:04:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) read$watch_queue(r0, 0x0, 0x0) 00:04:24 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 00:04:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 00:04:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "dcd89b5aaf7680a3"}) 00:04:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "dcd89b5aaf7680a3"}) 00:04:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 00:04:26 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r0, r1, 0x0) bind$unix(r1, &(0x7f0000000000)=@abs={0x1}, 0x6e) 00:04:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) read$watch_queue(r0, 0x0, 0x0) 00:04:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, 0x0) 00:04:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) read$watch_queue(r0, 0x0, 0x0) 00:04:28 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 00:04:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BLKRESETZONE(r0, 0x89e0, 0x0) 00:04:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/shm\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "dcd89b5aaf7680a3"}) 00:04:30 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 00:04:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BLKRESETZONE(r0, 0x89e0, 0x0) 00:04:31 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_CONNECTINFO(r0, 0x80045505, &(0x7f0000000000)) 00:04:31 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) [ 272.707366][ T3471] usb usb1: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 00:04:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 00:04:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_CONNECTINFO(r0, 0x80045505, &(0x7f0000000000)) 00:04:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) [ 274.256419][ T3476] usb usb1: usbfs: interface 0 claimed by hub while 'syz-executor.0' sets config #0 00:04:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) 00:04:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$BLKRESETZONE(r0, 0x89e0, 0x0) 00:04:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) 00:04:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDDELIO(r0, 0x5452, 0x20000000) 00:04:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) 00:04:39 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) 00:04:39 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0xffffff4f, 0x4) 00:04:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) [ 280.907069][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 280.907272][ T29] audit: type=1400 audit(280.490:128): avc: denied { create } for pid=3496 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 280.939787][ T29] audit: type=1400 audit(280.570:129): avc: denied { setopt } for pid=3496 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:04:40 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) 00:04:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x1c1401, 0x0) write(r3, 0x0, 0x0) dup3(r0, r1, 0x0) 00:04:42 executing program 0: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') [ 283.872260][ T29] audit: type=1400 audit(283.500:130): avc: denied { read write } for pid=3507 comm="syz-executor.0" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 283.896489][ T29] audit: type=1400 audit(283.500:131): avc: denied { open } for pid=3507 comm="syz-executor.0" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 283.935267][ T29] audit: type=1400 audit(283.550:132): avc: denied { ioctl } for pid=3507 comm="syz-executor.0" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 00:04:43 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="18", 0xbcca6b2d630ef74a}) [ 284.481391][ T3181] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 284.946041][ T3181] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 285.137331][ T3181] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 285.138309][ T3181] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 285.138985][ T3181] usb 1-1: Product: syz [ 285.139542][ T3181] usb 1-1: Manufacturer: syz [ 285.140117][ T3181] usb 1-1: SerialNumber: syz [ 285.390943][ T29] audit: type=1400 audit(285.020:133): avc: denied { read } for pid=3510 comm="syz-executor.1" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 285.411133][ T29] audit: type=1400 audit(285.040:134): avc: denied { open } for pid=3510 comm="syz-executor.1" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 285.526167][ T29] audit: type=1400 audit(285.120:135): avc: denied { ioctl } for pid=3510 comm="syz-executor.1" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64bd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 285.538630][ T3511] syz-executor.1: vmalloc error: size 1661925282, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 285.543151][ T3511] CPU: 0 PID: 3511 Comm: syz-executor.1 Not tainted 6.9.0-rc1-syzkaller-00379-g18737353cca0 #0 [ 285.544210][ T3511] Hardware name: linux,dummy-virt (DT) [ 285.545405][ T3511] Call trace: [ 285.545866][ T3511] dump_backtrace+0x9c/0x11c [ 285.547970][ T3511] show_stack+0x18/0x24 [ 285.548467][ T3511] dump_stack_lvl+0xdc/0xf4 [ 285.548946][ T3511] dump_stack+0x1c/0x28 [ 285.549387][ T3511] warn_alloc+0x1c0/0x308 [ 285.549861][ T3511] __vmalloc_node_range+0x930/0xd8c [ 285.550428][ T3511] kvmalloc_node+0xf8/0x148 [ 285.550929][ T3511] drm_property_create_blob+0x5c/0x290 [ 285.551422][ T3511] drm_mode_createblob_ioctl+0xe8/0x444 [ 285.551914][ T3511] drm_ioctl_kernel+0x15c/0x2cc [ 285.552377][ T3511] drm_ioctl+0x4ac/0xb50 [ 285.552897][ T3511] __arm64_sys_ioctl+0x124/0x190 [ 285.553545][ T3511] invoke_syscall+0x6c/0x258 [ 285.554517][ T3511] el0_svc_common.constprop.0+0xac/0x230 [ 285.556354][ T3511] do_el0_svc+0x40/0x58 [ 285.557588][ T3511] el0_svc+0x50/0x180 [ 285.559343][ T3511] el0t_64_sync_handler+0x100/0x12c [ 285.561597][ T3511] el0t_64_sync+0x190/0x194 [ 285.671962][ T3511] Mem-Info: [ 285.725904][ T3511] active_anon:8446 inactive_anon:0 isolated_anon:0 [ 285.725904][ T3511] active_file:2850 inactive_file:9157 isolated_file:0 [ 285.725904][ T3511] unevictable:768 dirty:11 writeback:0 [ 285.725904][ T3511] slab_reclaimable:7023 slab_unreclaimable:30071 [ 285.725904][ T3511] mapped:7295 shmem:855 pagetables:363 [ 285.725904][ T3511] sec_pagetables:0 bounce:0 [ 285.725904][ T3511] kernel_misc_reclaimable:0 [ 285.725904][ T3511] free:318439 free_pcp:345 free_cma:8000 [ 285.748121][ T3511] Node 0 active_anon:33784kB inactive_anon:0kB active_file:11400kB inactive_file:36628kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:29180kB dirty:44kB writeback:0kB shmem:3420kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5888kB pagetables:1452kB sec_pagetables:0kB all_unreclaimable? no [ 285.750630][ T3511] Node 0 DMA free:1273532kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB active_anon:33784kB inactive_anon:0kB active_file:11400kB inactive_file:36628kB unevictable:3072kB writepending:44kB present:2097152kB managed:1604596kB mlocked:0kB bounce:0kB free_pcp:1416kB local_pcp:756kB free_cma:32000kB [ 285.752803][ T3511] lowmem_reserve[]: 0 0 0 0 0 [ 285.805461][ T3511] Node 0 DMA: 19*4kB (UME) 103*8kB (UME) 12*16kB (UM) 8*32kB (UE) 18*64kB (UME) 6*128kB (UE) 4*256kB (UEC) 0*512kB 5*1024kB (UMEC) 3*2048kB (MEC) 307*4096kB (MC) = 1273028kB [ 285.810838][ T3511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 285.811590][ T3511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 285.812237][ T3511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 285.812899][ T3511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 285.836565][ T3511] 12862 total pagecache pages [ 285.841633][ T3511] 0 pages in swap cache [ 285.846904][ T3511] Free swap = 124996kB [ 285.848527][ T3511] Total swap = 124996kB [ 285.849345][ T3511] 524288 pages RAM [ 285.849882][ T3511] 0 pages HighMem/MovableOnly [ 285.850449][ T3511] 123139 pages reserved [ 285.851068][ T3511] 8192 pages cma reserved [ 285.870914][ T3511] 0 pages hwpoisoned 00:04:45 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0xffffff4f, 0x4) [ 286.616602][ T3181] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 286.619336][ T3181] cdc_ncm 1-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 286.620230][ T3181] cdc_ncm 1-1:1.0: setting rx_max = 2048 00:04:46 executing program 1: syz_read_part_table(0x5d6, &(0x7f0000000600)="$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") [ 287.096972][ T3181] cdc_ncm 1-1:1.0: setting tx_max = 88 [ 287.285491][ T3181] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 287.427097][ T3181] usb 1-1: USB disconnect, device number 2 [ 287.502991][ T3181] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 288.133634][ C0] hrtimer: interrupt took 852016 ns 00:04:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 289.156704][ T29] audit: type=1400 audit(288.780:136): avc: denied { read } for pid=3018 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 289.531104][ T3515] loop1: detected capacity change from 0 to 2048 [ 290.171882][ T29] audit: type=1400 audit(289.800:137): avc: denied { write } for pid=3516 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 290.180618][ T3517] Zero length message leads to an empty skb [ 290.245569][ T3515] loop1: p1 p2 p3 00:04:50 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001f40)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) 00:04:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="18", 0xbcca6b2d630ef74a}) 00:04:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000001580)={0x14, 0x3, 0x1, 0x5}, 0x14}}, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) recvmsg$unix(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:04:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, 0x0) [ 292.227083][ T3371] udevd[3371]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 292.278623][ T3322] udevd[3322]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 292.367955][ T3372] udevd[3372]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 293.054728][ T29] audit: type=1400 audit(292.680:138): avc: denied { read } for pid=3522 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:04:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001f40)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) 00:04:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000001580)={0x14, 0x3, 0x1, 0x5}, 0x14}}, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) recvmsg$unix(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:04:53 executing program 1: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') 00:04:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000001580)={0x14, 0x3, 0x1, 0x5}, 0x14}}, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000080)=0x80) recvmsg$unix(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 295.331402][ T3532] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 295.479486][ T3532] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:04:55 executing program 0: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') [ 296.946224][ T3181] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 297.335960][ T3181] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 00:04:56 executing program 1: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') [ 297.527109][ T3181] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 297.529063][ T3181] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 297.529475][ T3181] usb 1-1: Product: syz [ 297.529777][ T3181] usb 1-1: Manufacturer: syz [ 297.531118][ T3181] usb 1-1: SerialNumber: syz [ 298.071251][ T3538] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 298.107526][ T3538] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 298.925244][ T3181] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 298.925815][ T3181] cdc_ncm 1-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 298.926260][ T3181] cdc_ncm 1-1:1.0: setting rx_max = 2048 [ 299.366232][ T3181] cdc_ncm 1-1:1.0: setting tx_max = 88 [ 299.479465][ T3181] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 299.596023][ T3181] usb 1-1: USB disconnect, device number 3 [ 299.629221][ T3181] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) 00:04:59 executing program 1: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43}, 0x0) 00:05:00 executing program 0: 00:05:00 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) [ 302.031631][ T29] audit: type=1400 audit(301.650:139): avc: denied { create } for pid=3541 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 302.108147][ T29] audit: type=1400 audit(301.740:140): avc: denied { ioctl } for pid=3541 comm="syz-executor.1" path="socket:[4539]" dev="sockfs" ino=4539 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 00:05:01 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0]) openat$autofs(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:05:02 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 00:05:02 executing program 0: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43}, 0x0) 00:05:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:05:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 00:05:04 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 00:05:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$MRT_DEL_MFC(r0, 0x0, 0x6, 0x0, 0x0) 00:05:05 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) [ 305.599526][ T3557] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 305.669895][ T29] audit: type=1400 audit(305.290:141): avc: denied { setopt } for pid=3555 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:05:05 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 00:05:06 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) fcntl$setpipe(r2, 0x407, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) 00:05:06 executing program 1: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43}, 0x0) 00:05:07 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) fcntl$setpipe(r2, 0x407, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) 00:05:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 00:05:08 executing program 0: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') 00:05:08 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x90800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) fcntl$setpipe(r2, 0x407, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) [ 309.397417][ T3181] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 309.806101][ T3181] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 309.988961][ T3181] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 309.990052][ T3181] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 309.990720][ T3181] usb 1-1: Product: syz [ 309.991315][ T3181] usb 1-1: Manufacturer: syz [ 309.991868][ T3181] usb 1-1: SerialNumber: syz 00:05:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:05:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0x9) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, 0x0) [ 311.356241][ T3181] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 311.357111][ T3181] cdc_ncm 1-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 311.357736][ T3181] cdc_ncm 1-1:1.0: setting rx_max = 2048 [ 311.526842][ T29] audit: type=1400 audit(311.150:142): avc: denied { listen } for pid=3578 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 311.805869][ T3181] cdc_ncm 1-1:1.0: setting tx_max = 88 [ 311.911772][ T3181] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 311.979470][ T3181] usb 1-1: USB disconnect, device number 4 [ 312.040085][ T3181] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 312.084959][ T29] audit: type=1400 audit(311.710:143): avc: denied { ioctl } for pid=3578 comm="syz-executor.1" path="socket:[4625]" dev="sockfs" ino=4625 ioctlcmd=0x5351 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:05:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:05:13 executing program 1: r0 = epoll_create1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 00:05:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) fcntl$lock(r1, 0x0, &(0x7f0000000240)) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x5451, 0x0) 00:05:14 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x5451, 0x0) 00:05:15 executing program 0: bpf$BPF_GET_PROG_INFO(0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 00:05:15 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000200)={0x7}, 0x7) 00:05:16 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 00:05:16 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000200)={0x7}, 0x7) 00:05:17 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$HIDIOCGFLAG(r2, 0x8004480e, &(0x7f0000000080)) 00:05:17 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$SOUND_MIXER_WRITE_RECSRC(r1, 0xc0044dff, &(0x7f00000002c0)) 00:05:17 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000200)={0x7}, 0x7) 00:05:17 executing program 1: r0 = epoll_create1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 00:05:18 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001500), &(0x7f0000001540)=0x4) 00:05:18 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$HIDIOCGFLAG(r2, 0x8004480e, &(0x7f0000000080)) [ 319.654938][ T29] audit: type=1400 audit(319.280:144): avc: denied { getopt } for pid=3609 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:05:19 executing program 0: r0 = epoll_create1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) 00:05:19 executing program 1: 00:05:20 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = dup(r0) write$P9_RFLUSH(r1, 0x0, 0x0) 00:05:20 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = dup3(r0, r1, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000280)) [ 321.349195][ T29] audit: type=1400 audit(320.980:145): avc: denied { write } for pid=3616 comm="syz-executor.1" path="socket:[5254]" dev="sockfs" ino=5254 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:05:21 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) [ 321.735346][ T29] audit: type=1400 audit(321.350:146): avc: denied { read } for pid=3617 comm="syz-executor.0" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 321.736956][ T29] audit: type=1400 audit(321.350:147): avc: denied { open } for pid=3617 comm="syz-executor.0" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 00:05:21 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x2032, r0, 0x0) 00:05:22 executing program 1: setresuid(0xee00, 0xee01, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0xfffffffd) 00:05:22 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000003a00)) 00:05:22 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = dup3(r0, r1, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000280)) [ 323.558338][ T29] audit: type=1400 audit(323.180:148): avc: denied { getopt } for pid=3626 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 00:05:23 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x2032, r0, 0x0) 00:05:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) read$proc_mixer(r0, 0x0, 0x0) 00:05:24 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = dup3(r0, r1, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000280)) [ 324.899180][ T29] audit: type=1400 audit(324.530:149): avc: denied { read } for pid=3632 comm="syz-executor.1" path="socket:[4710]" dev="sockfs" ino=4710 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:05:24 executing program 1: setresuid(0xee00, 0xee01, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0xfffffffd) 00:05:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00.\x00['], 0x34}}, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:05:25 executing program 1: bpf$BPF_PROG_ATTACH(0x17, 0x0, 0x0) [ 326.458429][ T3640] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:05:26 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = dup(r0) write$P9_RFLUSH(r1, 0x0, 0x0) 00:05:26 executing program 1: bind$rds(0xffffffffffffffff, 0x0, 0x0) 00:05:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00.\x00['], 0x34}}, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:05:27 executing program 1: pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x1e}, @void}}}, 0x1c}}, 0x8c0) [ 327.835421][ T3647] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:05:27 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x181641, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x6611, 0x1) 00:05:28 executing program 1: 00:05:28 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x40141) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 00:05:29 executing program 1: setresuid(0xee00, 0xee01, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0xfffffffd) 00:05:29 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000000), 0x2000) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1ff) read(r1, &(0x7f0000000000), 0x2000) close(r1) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) 00:05:29 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000000), 0x2000) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1ff) read(r1, &(0x7f0000000000), 0x2000) close(r1) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) 00:05:30 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x181641, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x6611, 0x1) 00:05:30 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) [ 332.056255][ T29] audit: type=1400 audit(331.670:150): avc: denied { create } for pid=3662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:05:31 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0xa, 0x3, 0xcb) dup3(r2, r0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) [ 332.150896][ T29] audit: type=1400 audit(331.780:151): avc: denied { write } for pid=3662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:05:32 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000000), 0x2000) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1ff) read(r1, &(0x7f0000000000), 0x2000) close(r1) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) 00:05:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:05:33 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x181641, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x6611, 0x1) [ 334.865281][ T29] audit: type=1400 audit(334.470:152): avc: denied { create } for pid=3669 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 334.905947][ T29] audit: type=1400 audit(334.540:153): avc: denied { bind } for pid=3669 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 334.980702][ T29] audit: type=1400 audit(334.580:154): avc: denied { accept } for pid=3669 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 335.037859][ T29] audit: type=1400 audit(334.660:155): avc: denied { write } for pid=3669 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:05:34 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0xa, 0x3, 0xcb) dup3(r2, r0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 00:05:35 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x181641, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x6611, 0x1) 00:05:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x3c, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}}}}, 0x3c}}, 0x4000800) 00:05:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getpeername$l2tp(r0, 0x0, &(0x7f00000000c0)) 00:05:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:05:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0xfffffffe) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, 0x0) 00:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:05:39 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 00:05:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf0ffffff}, 0x0) 00:05:40 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x40049409, 0x0) 00:05:41 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getpeername$l2tp(r0, 0x0, &(0x7f00000000c0)) [ 342.099586][ T29] audit: type=1400 audit(341.730:156): avc: denied { ioctl } for pid=3691 comm="syz-executor.0" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 00:05:41 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getpeername$l2tp(r0, 0x0, &(0x7f00000000c0)) 00:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r2, 0xc0245720, 0x0) 00:05:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMGET(r0, 0x40049409, 0x0) 00:05:44 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x40049409, 0x0) [ 345.387301][ T3698] "syz-executor.1" (3698) uses obsolete ecb(arc4) skcipher 00:05:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) 00:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r2, 0xc0245720, 0x0) 00:05:46 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10850}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) [ 347.025499][ T3710] "syz-executor.0" (3710) uses obsolete ecb(arc4) skcipher [ 347.076834][ T29] audit: type=1400 audit(346.700:157): avc: denied { ioctl } for pid=3709 comm="syz-executor.0" path="socket:[5386]" dev="sockfs" ino=5386 ioctlcmd=0x5720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:05:46 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f00000000c0)='/dev/kvm\x00', 0x9, 0x0) 00:05:47 executing program 1: [ 347.983265][ T29] audit: type=1400 audit(347.610:158): avc: denied { read } for pid=3713 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 348.005017][ T29] audit: type=1400 audit(347.610:159): avc: denied { open } for pid=3713 comm="syz-executor.0" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 348.015998][ T3714] SELinux: Context /dev/kvm is not valid (left unmapped). [ 348.020572][ T29] audit: type=1400 audit(347.650:161): avc: denied { read } for pid=2973 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 348.021971][ T29] audit: type=1400 audit(347.650:160): avc: denied { relabelto } for pid=3713 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="/dev/kvm" [ 348.045269][ T29] audit: type=1400 audit(347.650:162): avc: denied { associate } for pid=3713 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="/dev/kvm" [ 348.047031][ T29] audit: type=1400 audit(347.670:163): avc: denied { append } for pid=2973 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.048326][ T29] audit: type=1400 audit(347.670:164): avc: denied { open } for pid=2973 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.050632][ T29] audit: type=1400 audit(347.670:165): avc: denied { getattr } for pid=2973 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 00:05:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) 00:05:48 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x40049409, 0x0) 00:05:48 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000100)) 00:05:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 349.896965][ T29] audit: type=1400 audit(349.520:166): avc: denied { create } for pid=3720 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 349.897924][ T29] audit: type=1400 audit(349.520:167): avc: denied { create } for pid=3721 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:05:49 executing program 1: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x4a9, &(0x7f0000000580)="$eJzs3c9PHNcdAPDvDGCwjQtufWh7qdu6dSXLu8bIArcXt6rkQ2WprY+tRAisEWKXReziGOQD/h8ixUkuSQ45JFKkSDnmwB+QY6T8OCc5RIoSmxyiHLLRzC4YYxZIjFmJ/Xykp5k3z97ve4zmveUL7Auga52NiNWIOBYRz0XEUOt60ipxrVmyf7f+4O5UVpJoNG5+neTtDx/cnYot/ydzsvWaAxHx3+sRzydPxq0tr8xNlsulxVa9WK8sFGvLKxdnK5MzpZnS/MjYldHx8bGr46MHNtZ3Pn/vg/IX1z9bvfrKpx/+8J+xrFuDrbat4zhIzaH3bcbJ9EbEv55FsA7oaY3nWKc7ws+SRsQvI+IP+fM/FD353QQAjrJGYygaQ1vrAMBRl+Y5sCQttHIBg5GmhUIzh3cmTqTlaq1+4VZ1aX66mSsbjr701my5dKmVKxyOviSrj+Tnj+qXt9VHI+J0RLzYfzyvF6aq5elOvvEBgC52ctv6/21/c/0HAI64gU53AAA4dNZ/AOg+1n8A6D7WfwDoPtZ/AOg+1n8A6D7WfwDoKv++cSMrjfXW519P315emqvevjhdqs0VKktThanq4kJhplqdyT+zp7LX65Wr1YXL47F0p1gv1erF2vLKRKW6NF+fyD/Xe6LUdyijAgB2c/p3a58kEbH61+N5iS17OVir4WhLO90BoGN6Ot0BoGPs9gXdy/f4wA5b9D6m7a8I3T/4vgCH4/xv5P+hW8n/Q/eS/4fuJf8P3avRSOz5DwBdRo4f8PN/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+OkG85KkhdZe4IORpoVCxKmIGI6+5NZsuXQpIn4RER/39/Vn9ZFOdxoAeErpl0lr/6/zQ+cGt7ceS77rz48R8cKrN1+6M1mvL45k17/ZvF6/37p+uRP9BwD2srFOb6zjGx4+uDu1UQ6zP1/9vbm5aBZ3vVWaLb3Rmx8Hoi8iTqwnrXpT9n6l5wDir96LiF/vNP4kz40Mt3Y+3R4/i33qUOOnj8VP87bmMfta/OoA+gLdZi2bf67t9PylcTY/7vz8D+Qz1NPbmP/Wn5j/0s35r6fN/Hd2nzEufVRZbxv/XsRve3eKn2zGT9rEP7fP+G/8f+39dm2N1yPOx87xt8Yq1isLxdryysXZyuRMaaY0PzJ2ZXR8fOzq+Ggxz1EXNzLVT/r+5Xcndhv/iTbxB/YY/5/2Of7/vX3zH7/fJf5f/rjz/T+zS/xsTfzzPuPf+dtra+3asvjTbca/1/2/sM/4b771z7b3HwA4fLXllbnJcrm06MSJEyebJ52emYBn7dFD3+meAAAAAAAAAAAAAAAA7RzGnxN1eowAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcXT8GAAD//61B3Zo=") 00:05:49 executing program 0: syz_clone(0x0, 0x0, 0xffffffffffffffe9, &(0x7f0000002300), &(0x7f0000002340), 0x0) 00:05:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 351.602273][ T3728] loop1: detected capacity change from 0 to 512 [ 352.188443][ T3728] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 00:05:52 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10850}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) [ 352.532500][ T3186] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:05:52 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000100)) 00:05:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000140)) 00:05:53 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), 0x4) 00:05:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f00000014c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "74cbe106e95e00d98f928aecf309b2046e8029336043e414ab305ed5a6103c2bd038d2d049404feec08a8456e8badc3b9278477e77e3cea268bd5527cc61d8", 0x36}, 0x60) [ 355.268113][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 355.268333][ T29] audit: type=1400 audit(354.900:172): avc: denied { create } for pid=3742 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 355.384986][ T29] audit: type=1400 audit(355.010:173): avc: denied { connect } for pid=3742 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 00:05:55 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000080)={0x4000000}) pread64(r0, 0x0, 0x0, 0x0) 00:05:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') fcntl$lock(r1, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5451, 0x0) 00:05:56 executing program 1: 00:05:57 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), 0x4) 00:05:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x4880) 00:05:58 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f00000014c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "74cbe106e95e00d98f928aecf309b2046e8029336043e414ab305ed5a6103c2bd038d2d049404feec08a8456e8badc3b9278477e77e3cea268bd5527cc61d8", 0x36}, 0x60) 00:05:59 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000740)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5450, 0x0) 00:05:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) [ 360.265827][ T29] audit: type=1400 audit(359.890:174): avc: denied { write } for pid=3758 comm="syz-executor.1" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 00:06:00 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), 0x4) 00:06:00 executing program 0: r0 = socket(0xa, 0x1, 0x0) recvfrom$inet_nvme(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:06:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 00:06:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002c00)=[{{&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001400)="df", 0x1}], 0x1}}], 0x2, 0x4008000) sendmsg$sock(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x20040010) 00:06:02 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') fcntl$lock(r1, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5451, 0x0) [ 363.091391][ T3770] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 363.122380][ T29] audit: type=1400 audit(362.750:175): avc: denied { write } for pid=3768 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:06:03 executing program 0: r0 = socket(0xa, 0x1, 0x0) recvfrom$inet_nvme(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:06:03 executing program 1: 00:06:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002c00)=[{{&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001400)="df", 0x1}], 0x1}}], 0x2, 0x4008000) sendmsg$sock(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x20040010) 00:06:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0x8907, 0x0) 00:06:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') fcntl$lock(r1, 0x0, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5451, 0x0) 00:06:05 executing program 1: pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x6bff5e002308b201) 00:06:06 executing program 0: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f00000001c0), 0xc06620, 0x4) ioctl$UFFDIO_COPY(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000adb000/0x2000)=nil, &(0x7f0000528000/0x1000)=nil, 0x2000}) 00:06:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xfffffffffffffcdf, 0x0, 0x0, 0x0) [ 367.262944][ T29] audit: type=1400 audit(366.890:176): avc: denied { create } for pid=3783 comm="syz-executor.0" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 367.317353][ T29] audit: type=1400 audit(366.950:177): avc: denied { ioctl } for pid=3783 comm="syz-executor.0" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4984 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 00:06:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) 00:06:07 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) 00:06:08 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 00:06:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0xfffffffffffffcdf, 0x0, 0x0, 0x0) 00:06:09 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f00000001c0), 0xc06620, 0x4) ioctl$UFFDIO_COPY(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000adb000/0x2000)=nil, &(0x7f0000528000/0x1000)=nil, 0x2000}) 00:06:10 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) 00:06:11 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) 00:06:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8907, 0x0) 00:06:12 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) [ 372.708899][ T29] audit: type=1400 audit(372.330:178): avc: denied { create } for pid=3803 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 372.750984][ T29] audit: type=1400 audit(372.380:179): avc: denied { ioctl } for pid=3803 comm="syz-executor.1" path="socket:[5539]" dev="sockfs" ino=5539 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 00:06:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) 00:06:13 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 00:06:13 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) 00:06:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) 00:06:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, 0x0) 00:06:15 executing program 0: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f00000001c0), 0xc06620, 0x4) ioctl$UFFDIO_COPY(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000adb000/0x2000)=nil, &(0x7f0000528000/0x1000)=nil, 0x2000}) 00:06:16 executing program 1: r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f00000001c0), 0xc06620, 0x4) ioctl$UFFDIO_COPY(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000adb000/0x2000)=nil, &(0x7f0000528000/0x1000)=nil, 0x2000}) 00:06:17 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) 00:06:17 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r2}, 0x18) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 00:06:17 executing program 1: pipe2(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_type(r0, &(0x7f0000004380), 0x0) [ 378.501110][ T29] audit: type=1400 audit(378.130:180): avc: denied { ioctl } for pid=3825 comm="syz-executor.0" path="socket:[5554]" dev="sockfs" ino=5554 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 378.509798][ T29] audit: type=1400 audit(378.140:181): avc: denied { bind } for pid=3825 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:06:18 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14}, 0x14) 00:06:18 executing program 1: r0 = getpid() r1 = getpid() r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = socket$l2tp6(0xa, 0x2, 0x73) kcmp(r0, r1, 0x0, r2, r3) 00:06:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001100)='/proc/sysvipc/sem\x00', 0x0, 0x0) renameat(r0, &(0x7f0000001140)='.\x00', 0xffffffffffffffff, 0x0) 00:06:19 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r2}, 0x18) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 00:06:20 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:06:20 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:06:21 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="5b8fcedf24f2e36c", 0x8}], 0x1}, 0x0) sendmmsg$inet(r0, &(0x7f0000002000)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)='B', 0x1}], 0x1}}], 0x1, 0x0) 00:06:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') ioctl$TUNSETVNETBE(r0, 0x5450, 0x0) 00:06:22 executing program 1: pipe2(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_type(r0, &(0x7f0000004380), 0x0) 00:06:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:06:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:25 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:06:26 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="5b8fcedf24f2e36c", 0x8}], 0x1}, 0x0) sendmmsg$inet(r0, &(0x7f0000002000)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)='B', 0x1}], 0x1}}], 0x1, 0x0) 00:06:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:27 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:06:28 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="5b8fcedf24f2e36c", 0x8}], 0x1}, 0x0) sendmmsg$inet(r0, &(0x7f0000002000)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)='B', 0x1}], 0x1}}], 0x1, 0x0) 00:06:28 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'wg1\x00', {}, 0x8}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80044d0f, &(0x7f0000000040)) ioctl$FITHAW(r3, 0xc0045878) [ 389.165479][ T29] audit: type=1400 audit(388.790:182): avc: denied { connect } for pid=3864 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 389.169917][ T29] audit: type=1400 audit(388.790:183): avc: denied { ioctl } for pid=3864 comm="syz-executor.0" path="socket:[6169]" dev="sockfs" ino=6169 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:06:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup3(r2, r3, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000000)='ramfs\x00', &(0x7f0000000040)='./file0\x00', r5) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x10c, 0x3, 0x1, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@CTA_PROTOINFO={0x24, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x20, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x45}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffffb}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x7}, @CTA_SYNPROXY={0x2c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xffff}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x100}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x4edd}]}, @CTA_NAT_DST={0x30, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}]}]}, @CTA_NAT_DST={0x18, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x8040}, 0x24040010) ioctl$F2FS_IOC_FLUSH_DEVICE(r1, 0x4008f50a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'team_slave_0\x00', {}, 0x401}) r6 = fcntl$dupfd(r0, 0x0, r0) r7 = socket$xdp(0x2c, 0x3, 0x0) r8 = dup3(r6, r7, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'wg1\x00', {}, 0x8}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80044d0f, &(0x7f0000000040)) ioctl$FITHAW(r3, 0xc0045878) 00:06:31 executing program 0: 00:06:31 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x2f) 00:06:32 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0105303, &(0x7f0000000080)={{0xe2}}) 00:06:32 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2041, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 00:06:32 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 00:06:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'wg1\x00', {}, 0x8}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r2, r3, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80044d0f, &(0x7f0000000040)) ioctl$FITHAW(r3, 0xc0045878) 00:06:33 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:34 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="070000000000000081000000000000000300000000000080040000000000000008000000000000000500000000000000ff00000000000000000000000000000000000000000000000e0400000000000000000000000000000500000000000000050000000000000000800000000000000000000000000000000000000000000008050000000000000000000000000000374a000000000000070000800000000001000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000008001000000500000000100000000000000000000000000000000000000000000000300000000000000000000000000000033e085955e029d9b7acaeccb6a5fc640c1e1ad15f0e9a924c4eaec8eef7e5287"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) [ 395.268192][ T29] audit: type=1400 audit(394.880:184): avc: denied { create } for pid=3885 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 395.464799][ T29] audit: type=1400 audit(395.070:185): avc: denied { ioctl } for pid=3885 comm="syz-executor.1" path="socket:[6218]" dev="sockfs" ino=6218 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 00:06:35 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:36 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="070000000000000081000000000000000300000000000080040000000000000008000000000000000500000000000000ff00000000000000000000000000000000000000000000000e0400000000000000000000000000000500000000000000050000000000000000800000000000000000000000000000000000000000000008050000000000000000000000000000374a000000000000070000800000000001000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000008001000000500000000100000000000000000000000000000000000000000000000300000000000000000000000000000033e085955e029d9b7acaeccb6a5fc640c1e1ad15f0e9a924c4eaec8eef7e5287"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:38 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:38 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$NLBL_CIPSOV4_C_LISTALL(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) [ 400.107261][ T29] audit: type=1400 audit(399.740:186): avc: denied { write } for pid=3897 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 00:06:39 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x2f) 00:06:39 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:40 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2041, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 00:06:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0x8) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000940), &(0x7f0000000980)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x31}}}, 0x8, 0x6}, &(0x7f00000005c0)=0x90) close(r2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) socket$inet_sctp(0x2, 0x5, 0x84) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/sas_host', 0x40, 0x2c) syz_open_pts(r5, 0x50080) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440), &(0x7f0000000480)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'vlan0\x00', {0x2, 0x0, @multicast2}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xffff, @remote, 0xfe}}, [0x80, 0x3, 0x0, 0x7, 0x9, 0x5, 0x80, 0x16f, 0xffffffffffffffc1, 0x7, 0x0, 0xfffffffffffffffb, 0x7, 0x1, 0x7]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r7, 0xb9, "8fe994bbec10eac3bee561c0ffa85706d038a9576b36dfb4af4b278dfa550c13d7222e38425f66745fcdf2c2e630439d57f0dbf83a8e97213f38e653a0e7974b76b4d1aeeb01f2de73191b1db1c7dfbdbd737be6c46b2478100365cdff69888dd9367dc77f6e9974cd1db16e934823f69c87ecf43bbf5c8fd34e947d457900e7c65bd6513753765782d07c8902c426ee49bd8bfb453a4b9a8cf9e33b4786e8b3458c17fd36e0dbdfb7788d5681f193ad51bd474d461b9b4995"}, &(0x7f00000003c0)=0xc1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r6, 0x8983, &(0x7f0000000140)={0x0, 'bond_slave_1\x00', {}, 0x6}) getsockopt$sock_int(r5, 0x1, 0x26, &(0x7f0000000400), &(0x7f00000004c0)=0x4) 00:06:41 executing program 1: socketpair$nbd(0x2, 0x3, 0x0, &(0x7f0000000200)) 00:06:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x2f) 00:06:43 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000240)={0x0, 0x0, 0xe1}) 00:06:43 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 00:06:43 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2041, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 00:06:44 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000003240), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:06:44 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[], 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x48854) 00:06:44 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000240)={0x0, 0x0, 0xe1}) 00:06:45 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x894c, 0x0) 00:06:46 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 00:06:46 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000a40), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000140), 0x0, 0x0, 0x0) 00:06:47 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000240)={0x0, 0x0, 0xe1}) [ 408.156091][ T29] audit: type=1400 audit(407.780:187): avc: denied { setattr } for pid=3930 comm="syz-executor.1" name="controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 00:06:47 executing program 0: socketpair$nbd(0x2, 0x3, 0x0, &(0x7f0000000200)) 00:06:48 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[], 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x48854) 00:06:50 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 00:06:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$VT_GETMODE(r1, 0x540a, 0x0) [ 410.997579][ T3941] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 411.086004][ T29] audit: type=1400 audit(410.710:188): avc: denied { write } for pid=3940 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 00:06:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0xc040) 00:06:52 executing program 1: 00:06:53 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/power_supply', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) [ 414.036809][ T1082] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 414.382625][ T1082] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 00:06:54 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) [ 414.700925][ T1082] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.159786][ T1082] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 00:06:55 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080), 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5450, 0x0) [ 416.377221][ T29] audit: type=1400 audit(415.990:189): avc: denied { map_create } for pid=3956 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 416.392118][ T29] audit: type=1400 audit(416.020:190): avc: denied { map_read map_write } for pid=3956 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 00:06:56 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00'}) 00:06:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x5451) 00:06:58 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 419.018634][ T1082] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 419.121415][ T1082] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 419.252458][ T1082] bond0 (unregistering): Released all slaves 00:06:58 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) [ 420.099587][ T1082] hsr_slave_0: left promiscuous mode [ 420.200197][ T1082] hsr_slave_1: left promiscuous mode 00:06:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x7ffffffff000}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 420.481374][ T1082] veth1_macvtap: left promiscuous mode [ 420.507266][ T1082] veth0_macvtap: left promiscuous mode [ 420.517281][ T1082] veth1_vlan: left promiscuous mode [ 420.519698][ T1082] veth0_vlan: left promiscuous mode 00:07:00 executing program 1: 00:07:01 executing program 1: keyctl$negate(0xd, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x5450, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) pwritev2(r1, &(0x7f0000000340)=[{&(0x7f0000000240)="066223cb6fcf9fbbacdc326ee61c7c7efcf92bcdf812943ce7998ea235b1ec730430977aa5193b3585fee964fa6929732ea400ac9a178edb3c2e936fe99eb608d39d5f6711aca460a5e2b646bcb0e4ecc3e055d6c8b00413466f5a070954f89928bdaca10df202525dfc524ea6f3e72061e85c36a894e45475b58720327600e44e9b35f8eaad2a32e76042f162e0cdedc6bed11af233689f3b823d0bfe38322c1932a28179f4f8a82ed2102cc53fbffd95bfe69536b1ef3a75b2ed33db738fa2415768581646919303c8e5c3d96dbc8e83c920e915ef7b62602c233728b265b11609062b93d6", 0xe6}], 0x1, 0x8, 0x7, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), 0x4) r2 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='\x00', r2) 00:07:01 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/bonding', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f00000007c0)) 00:07:02 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) write$proc_mixer(r1, &(0x7f0000000080)=[{'SYNTH', @val={' \'', 'Line Capture Switch'}}], 0x31) 00:07:02 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000000ec0)=[{{&(0x7f00000007c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) [ 424.169199][ T29] audit: type=1400 audit(423.800:191): avc: denied { read } for pid=3981 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 00:07:03 executing program 1: keyctl$negate(0xd, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x5450, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) pwritev2(r1, &(0x7f0000000340)=[{&(0x7f0000000240)="066223cb6fcf9fbbacdc326ee61c7c7efcf92bcdf812943ce7998ea235b1ec730430977aa5193b3585fee964fa6929732ea400ac9a178edb3c2e936fe99eb608d39d5f6711aca460a5e2b646bcb0e4ecc3e055d6c8b00413466f5a070954f89928bdaca10df202525dfc524ea6f3e72061e85c36a894e45475b58720327600e44e9b35f8eaad2a32e76042f162e0cdedc6bed11af233689f3b823d0bfe38322c1932a28179f4f8a82ed2102cc53fbffd95bfe69536b1ef3a75b2ed33db738fa2415768581646919303c8e5c3d96dbc8e83c920e915ef7b62602c233728b265b11609062b93d6", 0xe6}], 0x1, 0x8, 0x7, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000140), 0x4) r2 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='\x00', r2) 00:07:04 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x0) fcntl$getown(r0, 0x9) 00:07:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2041, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 00:07:06 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000000ec0)=[{{&(0x7f00000007c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:07:07 executing program 1: setuid(0xee01) ioprio_set$uid(0x3, 0xee01, 0x6000) 00:07:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x7ffffffff000}, 0x1, 0x0, 0x100000000000000}, 0x0) 00:07:09 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x10) [ 430.712199][ T29] audit: type=1400 audit(430.330:192): avc: denied { ioctl } for pid=4002 comm="syz-executor.1" path="socket:[6559]" dev="sockfs" ino=6559 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:07:10 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x0) fcntl$getown(r0, 0x9) 00:07:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = dup(r0) ioctl$VHOST_VDPA_SET_CONFIG(r1, 0x4008af74, 0x0) [ 432.991856][ T29] audit: type=1400 audit(432.620:193): avc: denied { read } for pid=4012 comm="syz-executor.1" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 433.038530][ T29] audit: type=1400 audit(432.620:194): avc: denied { open } for pid=4012 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 433.120510][ T29] audit: type=1400 audit(432.750:195): avc: denied { ioctl } for pid=4012 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0xaf74 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 00:07:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@nl=@unspec, 0x80) 00:07:14 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2041, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 00:07:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x65}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x14, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7f}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_TOKEN={0x8}]}, 0x74}}, 0x0) [ 436.280407][ T4027] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4027 comm=syz-executor.1 00:07:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x4000004) 00:07:16 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x46, 0x0, "7447bdfb7246dc1369d0bb7a60da9faf9141bced6d946ff9c6c09125a5f7ab6d753b5b9d4a4d4c6f1daaca27cf5a3944cd8aa498b8d6d473a6f9e9091986f75a73ef8711b57f9cc772376e8104dd5b00"}, 0xd8) [ 438.335161][ T29] audit: type=1400 audit(437.960:196): avc: denied { setopt } for pid=4032 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 00:07:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 00:07:19 executing program 1: close(0xffffffffffffffff) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, 0x0) recvmsg$can_raw(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r1) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) [ 440.799818][ T29] audit: type=1400 audit(440.430:197): avc: denied { setopt } for pid=4041 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 440.827966][ T3948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 440.911263][ T3948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:07:22 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = dup(r0) ioctl$VHOST_VDPA_SET_CONFIG(r1, 0x4008af74, 0x0) 00:07:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c8c0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'wg2\x00', {}, 0xfffb}) ioctl$sock_proto_private(r0, 0x2, &(0x7f0000000140)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000140)={0x0, 'veth1_to_bond\x00', {}, 0x200}) [ 444.951403][ T29] audit: type=1400 audit(444.570:198): avc: denied { ioctl } for pid=4056 comm="syz-executor.1" path="socket:[6607]" dev="sockfs" ino=6607 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:07:25 executing program 1: close(0xffffffffffffffff) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, 0x0) recvmsg$can_raw(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r1) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) 00:07:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x400c8c0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000080)={0x0, 'wg2\x00', {}, 0xfffb}) ioctl$sock_proto_private(r0, 0x2, &(0x7f0000000140)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000140)={0x0, 'veth1_to_bond\x00', {}, 0x200}) [ 448.790042][ T3948] hsr_slave_0: entered promiscuous mode [ 448.857630][ T3948] hsr_slave_1: entered promiscuous mode [ 448.922639][ T3948] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 448.924115][ T3948] Cannot create hsr debugfs directory 00:07:28 executing program 1: close(0xffffffffffffffff) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, 0x0) recvmsg$can_raw(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r1) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000640), r1) 00:07:31 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8912, &(0x7f0000000080)) 00:07:32 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:07:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) getpeername$inet6(r1, 0x0, &(0x7f0000000080)) [ 455.258849][ T3948] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 455.399991][ T3948] netdevsim netdevsim0 netdevsim1: renamed from eth1 00:07:35 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r2) fcntl$dupfd(r1, 0x0, r0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000040)) [ 455.562845][ T3948] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 455.690752][ T3948] netdevsim netdevsim0 netdevsim3: renamed from eth3 00:07:37 executing program 1: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 00:07:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000001300)={'veth0_virt_wifi\x00', {0x2, 0x0, @loopback}}) 00:07:40 executing program 1: setreuid(0x0, 0xee00) openat$userio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 00:07:41 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:07:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) getpeername$inet6(r1, 0x0, &(0x7f0000000080)) [ 463.947100][ T3948] 8021q: adding VLAN 0 to HW filter on device bond0 00:07:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x400c0c0) 00:07:45 executing program 1: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 00:07:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c}, 0x1c}}, 0x0) 00:07:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SOUND_MIXER_WRITE_VOLUME(r2, 0x0, 0x0) 00:07:49 executing program 1: r0 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003600)={&(0x7f0000003800)={0x14}, 0x14}}, 0x0) [ 471.088870][ T29] audit: type=1400 audit(470.650:199): avc: denied { mount } for pid=4139 comm="syz-executor.1" name="/" dev="configfs" ino=1148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 00:07:51 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x3}, 0x5b, &(0x7f00000000c0)={&(0x7f0000000400)={0x60, 0x0, 0x0, 0x0, 0xffffa888, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT, @ETHTOOL_A_CHANNELS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x29, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x2b}]}, 0xe}}, 0x0) 00:07:52 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000000)={0x2c, 0x0, r1, 0x0, r0}, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x200440c2) 00:07:53 executing program 1: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 00:07:55 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0xaf0c}], 0x1, &(0x7f0000000280)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 00:07:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x894c, 0x0) 00:07:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) sendmmsg$nfc_llcp(r1, &(0x7f0000001640)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "02754f539c3adfdc935e0fe8f5ee41db389d9d821822301110c4699306a650b544d8c7ad8f6ef3193a693ae97ce9753d346c7e739714869344373339706c7a"}, 0x60, 0x0}], 0x1, 0x0) 00:08:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) setsockopt$inet_mreqsrc(r1, 0x0, 0x1, 0x0, 0x0) 00:08:01 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:08:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x3, 0x0, 0x0, 0x0, 0x2, 0x600200}) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r1, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r2 = fcntl$dupfd(r1, 0x0, r1) read$sequencer(r2, &(0x7f0000000040)=""/174, 0xae) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x0, 0xffffffff, 0x9, @dev, @remote, 0x80, 0x700}}) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000001a40)={&(0x7f0000000000), 0xc, &(0x7f0000001a00)={0x0}, 0x1, 0x0, 0x0, 0x20}, 0x20040000) [ 484.301000][ T3948] veth0_vlan: entered promiscuous mode [ 484.407688][ T3948] veth1_vlan: entered promiscuous mode [ 484.862897][ T3948] veth0_macvtap: entered promiscuous mode 00:08:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 484.975166][ T3948] veth1_macvtap: entered promiscuous mode [ 485.530297][ T3948] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.531354][ T3948] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.532012][ T3948] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.532785][ T3948] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:08:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002480), 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) [ 486.386413][ T29] audit: type=1400 audit(486.010:200): avc: denied { mounton } for pid=3948 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 00:08:06 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000003240), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:08:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002480), 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) 00:08:07 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x221c1, 0x0) 00:08:07 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0xaf0c}], 0x1, &(0x7f0000000280)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 00:08:08 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0xaf0c}], 0x1, &(0x7f0000000280)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 00:08:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x3, 0x0, 0x0, 0x0, 0x2, 0x600200}) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r1, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r2 = fcntl$dupfd(r1, 0x0, r1) read$sequencer(r2, &(0x7f0000000040)=""/174, 0xae) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x6, 0x0, 0xffffffff, 0x9, @dev, @remote, 0x80, 0x700}}) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000001a40)={&(0x7f0000000000), 0xc, &(0x7f0000001a00)={0x0}, 0x1, 0x0, 0x0, 0x20}, 0x20040000) 00:08:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0xfffffffe) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) 00:08:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae03, 0x6) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0x0, 0x0, {0xffff, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x78) 00:08:11 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d99175ce100000001700"], 0x10) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x20100, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0xd5a9, 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$netlink(0x2, 0x2, 0x4) 00:08:11 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0xaf0c}], 0x1, &(0x7f0000000280)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 00:08:13 executing program 1: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d99175ce100000001700"], 0x10) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x20100, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0xd5a9, 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$netlink(0x2, 0x2, 0x4) 00:08:14 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x221c1, 0x0) 00:08:15 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x5452, 0x20000000) 00:08:16 executing program 0: write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d99175ce100000001700"], 0x10) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x20100, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0xd5a9, 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$netlink(0x2, 0x2, 0x4) 00:08:17 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080), &(0x7f00000000c0)={'U+'}, 0x0, 0x1) 00:08:19 executing program 1: bpf$MAP_LOOKUP_ELEM(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:08:20 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:20 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmmsg(r0, 0x0, 0x0, 0x0) [ 501.435036][ T29] audit: type=1400 audit(501.060:201): avc: denied { create } for pid=4237 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 501.605882][ T29] audit: type=1400 audit(501.230:202): avc: denied { ioctl } for pid=4237 comm="syz-executor.1" path="socket:[7389]" dev="sockfs" ino=7389 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 00:08:21 executing program 0: pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 00:08:22 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r2 = dup3(r1, r0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) 00:08:22 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmmsg(r0, 0x0, 0x0, 0x0) 00:08:23 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080), &(0x7f00000000c0)={'U+'}, 0x0, 0x1) 00:08:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:24 executing program 1: bpf$MAP_LOOKUP_ELEM(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:08:25 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r2 = dup3(r1, r0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, 0x0, 0x0) 00:08:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:26 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, 0x0) 00:08:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 00:08:29 executing program 0: [ 509.812699][ T4276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4276 comm=syz-executor.1 00:08:29 executing program 1: 00:08:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) 00:08:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:30 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 00:08:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:32 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x2041, 0x0) close(r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 00:08:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r4, &(0x7f0000000000)={0x2c, 0x0, r5, 0x0, r4}, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x38}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x240480d1) close_range(r2, r1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001000), 0x600003, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'gre0\x00', {}, 0x3}) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$VHOST_SET_OWNER(r7, 0xaf01, 0x0) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f00000003c0)=@buf={0x2, &(0x7f0000000340)="f422"}) close(r7) r8 = syz_open_dev$mouse(&(0x7f0000000040), 0x8b7, 0x4000) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000001040)=""/4100) 00:08:33 executing program 1: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) [ 514.188230][ T29] audit: type=1400 audit(513.810:203): avc: denied { create } for pid=4293 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 00:08:33 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) dup3(r0, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, 0x0) 00:08:34 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x2041, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)) 00:08:34 executing program 1: 00:08:35 executing program 1: 00:08:35 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40000) 00:08:36 executing program 1: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 00:08:36 executing program 0: 00:08:37 executing program 0: r0 = epoll_create1(0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 00:08:37 executing program 1: r0 = socket$inet6(0xa, 0x80801, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5451, 0x0) 00:08:38 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 00:08:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0xa0340, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x40049409, 0x0) 00:08:40 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40000) 00:08:40 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 00:08:41 executing program 0: r0 = socket$inet6(0xa, 0x80801, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5451, 0x0) 00:08:41 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000000c0)) 00:08:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x4020940d, &(0x7f0000000080)) 00:08:43 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 00:08:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0xf}, 0x0) write$cgroup_pressure(r2, &(0x7f0000000980)={'some'}, 0x2f) write$cgroup_subtree(r2, &(0x7f00000005c0)={[{0x0, 'cpuacct'}]}, 0x9) 00:08:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0xf}, 0x0) write$cgroup_pressure(r2, &(0x7f0000000980)={'some'}, 0x2f) write$cgroup_subtree(r2, &(0x7f00000005c0)={[{0x0, 'cpuacct'}]}, 0x9) 00:08:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000000c0)) 00:08:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000000c0)) 00:08:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 00:08:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:08:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0xf}, 0x0) write$cgroup_pressure(r2, &(0x7f0000000980)={'some'}, 0x2f) write$cgroup_subtree(r2, &(0x7f00000005c0)={[{0x0, 'cpuacct'}]}, 0x9) 00:08:48 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) dup3(r0, r1, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r1, 0x80044dfb, &(0x7f0000000040)) 00:08:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000007740)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, 0x0, 0x0) 00:08:48 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) [ 529.927246][ T29] audit: type=1400 audit(529.560:204): avc: denied { read } for pid=4351 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:08:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) 00:08:49 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$sock_netdev_private(r0, 0x2, &(0x7f0000000040)) 00:08:50 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000600), 0x8, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 00:08:50 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 00:08:51 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup3(r1, r0, 0x0) write$FUSE_STATFS(r2, 0x0, 0x0) 00:08:51 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 00:08:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) 00:08:52 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 00:08:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 00:08:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) accept$unix(r1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) 00:08:53 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000600), 0x8, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 534.517072][ T29] audit: type=1400 audit(534.140:205): avc: denied { setopt } for pid=4374 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:08:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) accept$unix(r1, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) 00:08:54 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000600), 0x8, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f0000000080)=0x8) 00:08:55 executing program 1: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) vmsplice(r0, 0x0, 0x0, 0x0) 00:08:56 executing program 0: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) vmsplice(r0, 0x0, 0x0, 0x0) 00:08:56 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000001680)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 00:08:57 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup3(r1, r0, 0x0) write$FUSE_STATFS(r2, 0x0, 0x0) 00:08:57 executing program 1: r0 = getpid() r1 = getpid() r2 = eventfd2(0x0, 0x0) kcmp(r1, r0, 0x3, 0xffffffffffffffff, r2) 00:08:58 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$SNDCTL_SYNTH_INFO(r1, 0xc08c5102, &(0x7f0000000140)={"31a9369ed075a95449ba0bfc0543da516108e12f835072427995bb0073aa"}) 00:08:58 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(r1, r0, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x10}, 0x10}}, 0x0) 00:08:59 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000001680)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) [ 539.791875][ T29] audit: type=1400 audit(539.420:206): avc: denied { create } for pid=4396 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 539.837990][ T29] audit: type=1400 audit(539.470:207): avc: denied { write } for pid=4396 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 00:08:59 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000000)={0x2c, 0x0, r1, 0x0, r0}, 0x10) sendto(r0, &(0x7f0000002580)="3fefeadcc32a6914", 0x8, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8840) 00:09:00 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1100) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:09:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='smaps\x00') close(r0) socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000), 0x4) [ 541.826413][ T29] audit: type=1400 audit(541.450:208): avc: denied { setopt } for pid=4404 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:09:01 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000001680)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 00:09:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x894c, 0x0) 00:09:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x80108906, 0x0) 00:09:03 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000001680)=@abs={0x1, 0x0, 0x4e21}, 0x6e) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000001180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 00:09:03 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1100) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:09:04 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1100) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:09:04 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1100) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:09:04 executing program 0: 00:09:04 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, 0x0) 00:09:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:09:05 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:09:06 executing program 0: 00:09:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) write$binfmt_aout(r2, 0x0, 0x0) 00:09:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') write$P9_RWSTAT(r0, 0x0, 0x0) [ 547.621111][ T29] audit: type=1400 audit(547.250:209): avc: denied { write } for pid=4431 comm="syz-executor.1" path="socket:[7650]" dev="sockfs" ino=7650 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 00:09:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:09:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, 0x0, 0x48) [ 548.756061][ T29] audit: type=1400 audit(548.380:210): avc: denied { create } for pid=4435 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 548.790190][ T29] audit: type=1400 audit(548.420:211): avc: denied { write } for pid=4435 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:09:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x14) 00:09:08 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x15, &(0x7f0000000340)={0x0, @local, 0x0, 0x0, 'rr\x00'}, 0x2c) 00:09:09 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000002800), 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r2, 0x8010550e, 0x0) 00:09:09 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000009500), 0x965c, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = dup3(r2, r1, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000000040)) 00:09:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:09:10 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000009500), 0x965c, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = dup3(r2, r1, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000000040)) 00:09:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') write$P9_RWSTAT(r0, 0x0, 0x0) 00:09:11 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000002800), 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r2, 0x8010550e, 0x0) 00:09:12 executing program 1: sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, 0x0, 0x0) 00:09:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x15, &(0x7f0000000340)={0x0, @local, 0x0, 0x0, 'rr\x00'}, 0x2c) 00:09:13 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000009500), 0x965c, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = dup3(r2, r1, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000000040)) 00:09:14 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x10, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, 0x0, 0x0) 00:09:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:09:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001540)={0x14}, 0x14}}, 0x8000) 00:09:15 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 00:09:16 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x894c, 0x0) 00:09:16 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = dup(r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x0) 00:09:17 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="e0000000150001"], 0xe0}}, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r1) 00:09:17 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001540)={0x14}, 0x14}}, 0x8000) [ 558.328533][ T29] audit: type=1400 audit(557.960:212): avc: denied { read } for pid=4474 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 00:09:18 executing program 1: pipe2$watch_queue(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$xdp(r0, 0x0, 0x0) 00:09:18 executing program 0: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 00:09:19 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="e0000000150001"], 0xe0}}, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r1) 00:09:19 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x10, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, 0x0, 0x0) 00:09:20 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x63, 0x0) ioctl$EXT4_IOC_GETSTATE(r1, 0x5452, &(0x7f0000000040)) 00:09:20 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = dup(r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x0) 00:09:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001540)={0x14}, 0x14}}, 0x8000) 00:09:21 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 00:09:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x4000804) 00:09:22 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 00:09:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSARP(r0, 0x890b, &(0x7f00000001c0)={{0x2, 0x0, @broadcast}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'ip6gre0\x00'}) 00:09:23 executing program 0: ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) 00:09:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x1) 00:09:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, 0x0) 00:09:24 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000001c0), 0x0, 0x0) preadv2(r0, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x1, 0x0, 0x0, 0x0) 00:09:25 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[], 0x14}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 00:09:25 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, 0x0) 00:09:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x1) 00:09:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x4000000) 00:09:27 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x7c4}}, 0x8001) [ 568.455192][ T29] audit: type=1400 audit(568.080:213): avc: denied { write } for pid=4514 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 00:09:28 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x80000002) 00:09:28 executing program 0: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0xef39a24b96c6d80d) 00:09:28 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, 0x0) 00:09:29 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSARP(r0, 0x890b, &(0x7f00000001c0)={{0x2, 0x0, @broadcast}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'ip6gre0\x00'}) 00:09:30 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:09:30 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, 0x0) 00:09:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x80\x00', 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$KVM_CAP_HYPERV_DIRECT_TLBFLUSH(r2, 0x4068aea3, 0x0) 00:09:32 executing program 0: 00:09:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = fcntl$dupfd(r1, 0x0, r0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, 0x0, 0x0) 00:09:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:09:34 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[], 0x14}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 00:09:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x2200) 00:09:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, 0x0, 0x0) 00:09:36 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[], 0x14}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 00:09:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) [ 579.480471][ T29] audit: type=1400 audit(579.090:214): avc: denied { getopt } for pid=4546 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:09:39 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10}, 0x10}}, 0xcc094) 00:09:39 executing program 0: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) [ 580.799466][ T4551] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4551 comm=syz-executor.0 [ 580.905330][ T29] audit: type=1400 audit(580.530:215): avc: denied { audit_write } for pid=4549 comm="syz-executor.1" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 00:09:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:09:40 executing program 1: 00:09:41 executing program 1: 00:09:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60}, 0x60) 00:09:42 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001200)='/sys/class/usb_power_delivery', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000000c0)) 00:09:43 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:09:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 00:09:45 executing program 0: pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 00:09:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60}, 0x60) [ 586.140950][ T4566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4566 comm=syz-executor.0 00:09:46 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 00:09:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = fcntl$dupfd(r1, 0x0, r0) sendto(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, 0x0, 0x0) 00:09:46 executing program 0: pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:09:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCSIFBR(r0, 0x8912, &(0x7f0000000140)=@add_del={0x28, 0x0}) 00:09:48 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvfrom$l2tp(r0, 0x0, 0x0, 0x10022, 0x0, 0x0) sendmsg$nl_crypto(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="c9000000100001"], 0xe0}}, 0x0) 00:09:49 executing program 1: getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) 00:09:50 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = syz_io_uring_setup(0x7983, &(0x7f0000000180), &(0x7f0000ffc000), &(0x7f0000ffc000)) dup3(r1, r0, 0x0) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000003c0), 0x0) 00:09:50 executing program 1: setuid(0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={0x0, 0x2c}}, 0x0) [ 591.856693][ T29] audit: type=1400 audit(591.470:216): avc: denied { map } for pid=4583 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7896 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 591.859365][ T29] audit: type=1400 audit(591.480:217): avc: denied { read write } for pid=4583 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7896 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 00:09:51 executing program 1: 00:09:51 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 00:09:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000300)) 00:09:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 00:09:53 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0xcf, &(0x7f0000000080), &(0x7f0000000040)=0x4) 00:09:53 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002680), 0x1, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) 00:09:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 00:09:54 executing program 0: r0 = fanotify_init(0x0, 0x0) r1 = memfd_secret(0x0) fanotify_mark(r0, 0x1, 0x40000030, r1, 0x0) 00:09:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000300)) 00:09:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x5, 0x0, 0x0) 00:09:55 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000003340)='./file0\x00', 0x121040, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000004780)) 00:09:55 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/power_supply', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 00:09:56 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') ioctl$KDGETLED(r0, 0x5451, 0x0) 00:09:57 executing program 1: r0 = fanotify_init(0x0, 0x0) r1 = memfd_secret(0x0) fanotify_mark(r0, 0x1, 0x40000030, r1, 0x0) 00:09:57 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 00:09:57 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000003340)='./file0\x00', 0x121040, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000004780)) 00:09:58 executing program 0: r0 = fanotify_init(0x0, 0x0) r1 = memfd_secret(0x0) fanotify_mark(r0, 0x1, 0x40000030, r1, 0x0) 00:09:58 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000040)) 00:09:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 00:10:00 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f00000000c0)) 00:10:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x40c0) 00:10:01 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) dup3(r1, r0, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 00:10:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000025c0), 0x0, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5451, 0x0) 00:10:02 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000040)) 00:10:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 00:10:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x80800) 00:10:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000025c0), 0x0, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5451, 0x0) 00:10:04 executing program 0: r0 = epoll_create1(0x0) r1 = dup(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) dup3(r2, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x58}}, 0x0) 00:10:05 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$RTC_WIE_OFF(r2, 0x7010) 00:10:05 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000040)) 00:10:06 executing program 1: r0 = gettid() r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r2], 0x1c}}, 0x0) tkill(r0, 0x7) 00:10:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000025c0), 0x0, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x5451, 0x0) [ 607.927481][ T29] audit: type=1400 audit(607.540:218): avc: denied { read } for pid=4645 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:10:07 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080), 0xc) [ 608.560861][ T4646] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 00:10:08 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f00000000c0)) 00:10:09 executing program 0: r0 = gettid() r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r2], 0x1c}}, 0x0) tkill(r0, 0x7) 00:10:09 executing program 1: r0 = gettid() r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r2], 0x1c}}, 0x0) tkill(r0, 0x7) [ 611.231769][ T4658] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 00:10:11 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x20201, 0x0) [ 611.855802][ T4663] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 00:10:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0}}, 0x0) 00:10:12 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0xe88) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) 00:10:12 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendto$llc(r1, &(0x7f0000000100)="073384a763c85d42267bd72cee4aebf6d4d30eedc8e871cd250b983456a14bcdbf66b9e4dcd58581c174ff49c897912cd8f12a4b598d6a98b405d74c5013cd0833e968f81614e3b6184f66d7ce553c26d0cff5222e0a6abe050a1a35bc69160e19ff23e537b363313fe6ae22fa5097b1bbeb1e713a2e42164fdb86e7c4820fa9c10afd098ab9ff95dc7ae724cc2f6422693dc7f50bc76bb9ca91641f633fc3af7459776a9b8f4d117043aa321caecb2d80fabf248d1146ac2acc4d6c6cbdc96957ff", 0xffffffffffffffa7, 0x0, 0x0, 0x39) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:10:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x40049409, 0x0) 00:10:14 executing program 0: r0 = gettid() r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000000200000008000100", @ANYRES32=r2], 0x1c}}, 0x0) tkill(r0, 0x7) [ 616.260374][ T4681] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 00:10:16 executing program 0: r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:10:16 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0xe88) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) 00:10:17 executing program 0: pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x10800) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18}, 0xffffff9d) write$P9_RUNLINKAT(r0, &(0x7f0000000100)={0x7}, 0x7) 00:10:18 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 00:10:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0xfffffffe) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) 00:10:19 executing program 1: 00:10:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f000000cd00), 0x1, 0x0) sendfile(r1, r0, 0x0, 0x100) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f000000cd00), 0x1, 0x0) sendfile(r2, r0, 0x0, 0x5) 00:10:20 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 00:10:21 executing program 0: r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:10:22 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0xe88) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) 00:10:23 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:10:23 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) dup3(r0, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x44000) 00:10:23 executing program 1: setxattr$security_capability(&(0x7f0000000000)='./cgroup/cgroup.procs/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:10:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x8000031, r0, &(0x7f0000000100)='./file0\x00') 00:10:24 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) [ 625.519704][ T29] audit: type=1400 audit(625.150:219): avc: denied { watch watch_reads } for pid=4714 comm="syz-executor.1" path="/syzkaller-testdir741042236/syzkaller.YRz17B/323/file0" dev="vda" ino=1749 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 00:10:25 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=0xffffffffffffffff) 00:10:25 executing program 0: setxattr$security_capability(&(0x7f0000000000)='./cgroup/cgroup.procs/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 626.518414][ T29] audit: type=1400 audit(626.150:220): avc: denied { ioctl } for pid=4718 comm="syz-executor.1" path="socket:[8110]" dev="sockfs" ino=8110 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 00:10:26 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) 00:10:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x8000031, r0, &(0x7f0000000100)='./file0\x00') 00:10:27 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) 00:10:27 executing program 0: r0 = socket(0xa, 0x3, 0x6) write$FUSE_OPEN(r0, 0x0, 0x0) 00:10:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14}, 0x14}}, 0x20000800) 00:10:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003d00)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26) 00:10:29 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendto$llc(r1, &(0x7f0000000100)="073384a763c85d42267bd72cee4aebf6d4d30eedc8e871cd250b983456a14bcdbf66b9e4dcd58581c174ff49c897912cd8f12a4b598d6a98b405d74c5013cd0833e968f81614e3b6184f66d7ce553c26d0cff5222e0a6abe050a1a35bc69160e19ff23e537b363313fe6ae22fa5097b1bbeb1e713a2e42164fdb86e7c4820fa9c10afd098ab9ff95dc7ae724cc2f6422693dc7f50bc76bb9ca91641f633fc3af7459776a9b8f4d117043aa321caecb2d80fabf248d1146ac2acc4d6c6cbdc96957ff", 0xffffffffffffffa7, 0x0, 0x0, 0x39) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:10:29 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0x14) 00:10:30 executing program 1: setxattr$security_capability(&(0x7f0000000000)='./cgroup/cgroup.procs/file0\x00', 0x0, 0x0, 0x0, 0x0) 00:10:31 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) 00:10:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) 00:10:33 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) dup3(r0, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x44000) 00:10:33 executing program 0: r0 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 00:10:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, 0x0) 00:10:34 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x10, r0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000001c0)) 00:10:34 executing program 1: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x10, r0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000001c0)) 00:10:35 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getown(r0, 0x9) 00:10:36 executing program 0: r0 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 00:10:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 637.466213][ T4762] "syz-executor.1" (4762) uses obsolete ecb(arc4) skcipher 00:10:37 executing program 1: r0 = getpid() ptrace$getregset(0x4206, r0, 0x2, 0x0) 00:10:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0xfffffffe) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) 00:10:38 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x10, r0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000001c0)) 00:10:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "00f800", "0d4799db717edd1bbdc407080d7f4fcf", "05114a1d", "8657e2b7e43b34e4"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$sock_timeval(r1, 0x1, 0x31, &(0x7f0000000100), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r2, 0x0) 00:10:39 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$peeksig(0x10, r0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000001c0)) 00:10:40 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x1) 00:10:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:10:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0xfffffffe) ioctl$RNDADDTOENTCNT(r1, 0x40045201, 0x0) [ 642.767570][ T4780] "syz-executor.1" (4780) uses obsolete ecb(arc4) skcipher 00:10:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "00f800", "0d4799db717edd1bbdc407080d7f4fcf", "05114a1d", "8657e2b7e43b34e4"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$sock_timeval(r1, 0x1, 0x31, &(0x7f0000000100), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r2, 0x0) 00:10:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "00f800", "0d4799db717edd1bbdc407080d7f4fcf", "05114a1d", "8657e2b7e43b34e4"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$sock_timeval(r1, 0x1, 0x31, &(0x7f0000000100), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r2, 0x0) 00:10:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "00f800", "0d4799db717edd1bbdc407080d7f4fcf", "05114a1d", "8657e2b7e43b34e4"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$sock_timeval(r1, 0x1, 0x31, &(0x7f0000000100), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r2, 0x0) 00:10:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 647.419282][ T4794] "syz-executor.0" (4794) uses obsolete ecb(arc4) skcipher 00:10:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "00f800", "0d4799db717edd1bbdc407080d7f4fcf", "05114a1d", "8657e2b7e43b34e4"}, 0x28) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0xfffffffffffffede, 0x0, 0x0, 0x3000137) setsockopt$sock_timeval(r1, 0x1, 0x31, &(0x7f0000000100), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x11, r2, 0x0) 00:10:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x1d, r0) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000200)="e6", 0x1, r0) 00:10:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r2, 0x0) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:10:49 executing program 1: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)={0xaa0c2}, 0x18) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x6611, 0x0) 00:10:50 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:10:50 executing program 1: 00:10:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x1d, r0) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000200)="e6", 0x1, r0) 00:10:51 executing program 0: 00:10:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x1d, r0) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000200)="e6", 0x1, r0) 00:10:52 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:10:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:10:53 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000d80)=ANY=[], 0x14}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) read$alg(r0, &(0x7f0000000080)=""/57, 0x39) 00:10:54 executing program 1: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB], 0x88}}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$rds(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(r0) sendmsg$rds(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a00)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) [ 655.072499][ T29] audit: type=1400 audit(654.690:221): avc: denied { read } for pid=4818 comm="syz-executor.0" path="socket:[9297]" dev="sockfs" ino=9297 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:10:55 executing program 1: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB], 0x88}}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$rds(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(r0) sendmsg$rds(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a00)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:10:56 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac-aes-neon\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) dup3(r2, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, 0x0) 00:10:56 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 00:10:57 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:10:57 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000d80)=ANY=[], 0x14}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) read$alg(r0, &(0x7f0000000080)=""/57, 0x39) 00:10:58 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5450, 0x0) 00:10:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$input_event(r1, &(0x7f0000000000), 0x18) 00:11:00 executing program 1: syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB], 0x88}}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$rds(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(r0) sendmsg$rds(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a00)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:11:00 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 00:11:01 executing program 1: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x408) 00:11:01 executing program 0: 00:11:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 00:11:02 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x420}, 0x420}}, 0x0) [ 663.393148][ T29] audit: type=1400 audit(663.020:222): avc: denied { mount } for pid=4846 comm="syz-executor.1" name="/" dev="mqueue" ino=2729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 00:11:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:03 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) [ 663.747119][ T29] audit: type=1400 audit(663.330:223): avc: denied { unmount } for pid=3186 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 00:11:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 00:11:04 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x420}, 0x420}}, 0x0) 00:11:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac-aes-neon\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 00:11:05 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 00:11:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:10 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 00:11:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:14 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:15 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:16 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x8982, 0x0) 00:11:16 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x5452, &(0x7f0000000400)={'veth1_to_bridge\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) listen(r1, 0x1) r2 = mq_open(&(0x7f0000000000)='\'\x00', 0x40, 0x0, &(0x7f0000000080)={0x3, 0x8, 0xeaf, 0x9}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000480)={0x1, 'syzkaller0\x00', {}, 0x7}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)={0x4, 0xce, 0x7}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)='netdevsim0\x00') connect$unix(r1, &(0x7f0000000380)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) ioctl$sock_SIOCBRDELBR(r4, 0x5450, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000680)=@tipc=@id, &(0x7f0000000240)=0x80, 0x81800) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0x5450, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r6, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r7, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0xee01}, 0xc) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000200)={0x1, 'vlan0\x00', {}, 0x5}) 00:11:17 executing program 0: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x408) 00:11:18 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000240)) 00:11:18 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fsetxattr(r0, &(0x7f0000000280)=@random={'security.', 'syztnl0\x00'}, 0x0, 0x0, 0x0) 00:11:19 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 00:11:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf64(r0, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:11:20 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 680.617562][ T29] audit: type=1400 audit(680.250:224): avc: denied { write } for pid=4902 comm="syz-executor.1" path="socket:[9461]" dev="sockfs" ino=9461 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 00:11:20 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100), 0x1fc219de, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x1) 00:11:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002900)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:11:21 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1e1941}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}}, 0xa0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000100)={0x7}, 0xfdef) 00:11:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 00:11:22 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000100), 0x1fc219de, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x1) [ 683.465809][ T4914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4914 comm=syz-executor.1 00:11:23 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$FITHAW(r0, 0x5450) 00:11:23 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf64(r0, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:11:23 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:11:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 00:11:24 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:11:25 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000100), 0x1fc219de, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x1) 00:11:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_void(r0, 0x29, 0x0, 0x0, 0x0) [ 686.564491][ T29] audit: type=1400 audit(686.190:225): avc: denied { setopt } for pid=4927 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:11:26 executing program 0: 00:11:26 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000000)=0x40) 00:11:26 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0x5451, 0x0) 00:11:27 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0x5451, 0x0) 00:11:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:11:27 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1e1941}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}}, 0xa0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000100)={0x7}, 0xfdef) [ 688.448817][ T29] audit: type=1400 audit(688.080:226): avc: denied { create } for pid=4937 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 688.469824][ T29] audit: type=1400 audit(688.100:227): avc: denied { write } for pid=4937 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 00:11:28 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0x5451, 0x0) 00:11:29 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40090) 00:11:29 executing program 1: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x40049409, 0x0) 00:11:29 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5451, 0x0) 00:11:30 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$FITHAW(r0, 0x5450) 00:11:30 executing program 0: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0xc0189436, &(0x7f0000000340)) 00:11:31 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) close(r0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz1\x00') 00:11:31 executing program 0: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x40049409, 0x0) 00:11:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40090) 00:11:33 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f0000000100)=0x54) 00:11:33 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) [ 694.371699][ T29] audit: type=1400 audit(693.990:228): avc: denied { getopt } for pid=4959 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 00:11:34 executing program 0: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x40049409, 0x0) [ 694.917807][ T29] audit: type=1400 audit(694.550:229): avc: denied { read } for pid=4961 comm="syz-executor.1" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 694.922133][ T29] audit: type=1400 audit(694.550:230): avc: denied { open } for pid=4961 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 694.947186][ T29] audit: type=1400 audit(694.570:231): avc: denied { ioctl } for pid=4961 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 00:11:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5451, 0x0) 00:11:35 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:11:35 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x5451, 0x0) 00:11:36 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 00:11:36 executing program 0: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x40049409, 0x0) 00:11:36 executing program 0: syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 00:11:36 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x5451, 0x0) 00:11:37 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0x40044102, 0x0) 00:11:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/usb-serial', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$inet6(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 00:11:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x6e, &(0x7f0000000040)={0x2, 0x0, 0x5}, 0x10) 00:11:39 executing program 1: syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) [ 700.561166][ T29] audit: type=1400 audit(700.160:232): avc: denied { name_connect } for pid=4983 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 00:11:41 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f00000000c0)) 00:11:42 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_START_POLL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x4008801) 00:11:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x0, 0xfffffffffffffea2, &(0x7f0000000000)="bdb2dacf4f02ec0267"}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000080)=""/156) 00:11:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) read$snapshot(r1, 0x0, 0x0) 00:11:45 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$PIO_CMAP(r1, 0x541b, &(0x7f0000000000)) 00:11:46 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1c9d) [ 708.359418][ T29] audit: type=1400 audit(707.970:233): avc: denied { read } for pid=4998 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 708.399958][ T29] audit: type=1400 audit(708.030:234): avc: denied { open } for pid=4998 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 708.537276][ T29] audit: type=1400 audit(708.160:235): avc: denied { ioctl } for pid=4998 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 00:11:48 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$PIO_CMAP(r1, 0x541b, &(0x7f0000000000)) 00:11:49 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000026c0), 0x0, 0x0) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1c9d) 00:11:50 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f00000000c0)) 00:11:50 executing program 1: ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, 0x0) syz_clone3(&(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:11:51 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$unix(r2, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) 00:11:52 executing program 1: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_COPY(r0, 0x3b83, &(0x7f0000000180)={0xfffffffffffffdcd}) 00:11:55 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1f, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000012c0)={0x3}) 00:11:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000040)=0x80) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000240), 0x4) 00:11:57 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 718.987267][ T29] audit: type=1400 audit(718.610:236): avc: denied { accept } for pid=5017 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 719.038161][ T29] audit: type=1400 audit(718.660:237): avc: denied { create } for pid=5017 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 719.631088][ T29] audit: type=1400 audit(719.260:238): avc: denied { setopt } for pid=5017 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 719.687754][ T29] audit: type=1400 audit(719.310:239): avc: denied { read write } for pid=5017 comm="syz-executor.0" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 719.699124][ T29] audit: type=1400 audit(719.320:240): avc: denied { open } for pid=5017 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 719.740658][ T5018] binder: 5017:5018 ioctl 80047213 20000580 returned -22 [ 719.742713][ T29] audit: type=1400 audit(719.370:241): avc: denied { ioctl } for pid=5017 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 719.797449][ T5018] binder: 5017:5018 ioctl 89f0 20000dc0 returned -22 [ 719.803010][ T5018] binder: 5017:5018 ioctl 8955 20000e00 returned -22 00:12:00 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 722.936615][ T5029] binder: 5023:5029 ioctl 80047213 20000580 returned -22 [ 723.058513][ T5029] binder: 5023:5029 ioctl 89f0 20000dc0 returned -22 [ 723.078135][ T5029] binder: 5023:5029 ioctl 8955 20000e00 returned -22 00:12:03 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 725.958920][ T5036] binder: 5030:5036 ioctl 80047213 20000580 returned -22 [ 726.197163][ T5033] binder: 5030:5033 ioctl 89f0 20000dc0 returned -22 [ 726.225944][ T5033] binder: 5030:5033 ioctl 8955 20000e00 returned -22 00:12:06 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 728.999094][ T5043] binder: 5037:5043 ioctl 80047213 20000580 returned -22 [ 729.105778][ T5040] binder: 5037:5040 ioctl 89f0 20000dc0 returned -22 [ 729.115661][ T5040] binder: 5037:5040 ioctl 8955 20000e00 returned -22 00:12:09 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 731.647108][ T5047] binder: 5044:5047 ioctl 80047213 20000580 returned -22 [ 731.685315][ T5047] binder: 5044:5047 ioctl 89f0 20000dc0 returned -22 [ 731.696739][ T5047] binder: 5044:5047 ioctl 8955 20000e00 returned -22 00:12:11 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 734.187369][ T5052] binder: 5051:5052 ioctl 80047213 20000580 returned -22 [ 734.285771][ T5052] binder: 5051:5052 ioctl 89f0 20000dc0 returned -22 [ 734.290006][ T5052] binder: 5051:5052 ioctl 8955 20000e00 returned -22 00:12:14 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 736.495451][ T5061] binder: 5058:5061 ioctl 80047213 20000580 returned -22 [ 736.571683][ T5061] binder: 5058:5061 ioctl 89f0 20000dc0 returned -22 [ 736.586518][ T5059] binder: 5058:5059 ioctl 8955 20000e00 returned -22 00:12:16 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 739.457312][ T5067] binder: 5064:5067 ioctl 80047213 20000580 returned -22 [ 739.499773][ T5065] binder: 5064:5065 ioctl 89f0 20000dc0 returned -22 [ 739.506536][ T5065] binder: 5064:5065 ioctl 8955 20000e00 returned -22 00:12:19 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 742.079232][ T5077] binder: 5071:5077 ioctl 80047213 20000580 returned -22 [ 742.189203][ T5077] binder: 5071:5077 ioctl 89f0 20000dc0 returned -22 [ 742.211113][ T5077] binder: 5071:5077 ioctl 8955 20000e00 returned -22 00:12:22 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 744.498333][ T5084] binder: 5078:5084 ioctl 80047213 20000580 returned -22 [ 744.606896][ T5084] binder: 5078:5084 ioctl 89f0 20000dc0 returned -22 [ 744.626960][ T5084] binder: 5078:5084 ioctl 8955 20000e00 returned -22 00:12:24 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 747.046046][ T5091] binder: 5085:5091 ioctl 80047213 20000580 returned -22 [ 747.119283][ T5088] binder: 5085:5088 ioctl 89f0 20000dc0 returned -22 [ 747.122994][ T5088] binder: 5085:5088 ioctl 8955 20000e00 returned -22 00:12:27 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 749.317480][ T5093] binder: 5092:5093 ioctl 80047213 20000580 returned -22 [ 749.456131][ T5093] binder: 5092:5093 ioctl 89f0 20000dc0 returned -22 [ 749.502649][ T5093] binder: 5092:5093 ioctl 8955 20000e00 returned -22 00:12:29 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 751.988497][ T5104] binder: 5098:5104 ioctl 80047213 20000580 returned -22 [ 752.079084][ T5104] binder: 5098:5104 ioctl 89f0 20000dc0 returned -22 [ 752.107693][ T5104] binder: 5098:5104 ioctl 8955 20000e00 returned -22 00:12:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 753.441753][ T29] audit: type=1400 audit(753.070:242): avc: denied { name_bind } for pid=5105 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 753.472200][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 756.147097][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:37 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) [ 759.599799][ T5116] binder: 5115:5116 ioctl 80047213 20000580 returned -22 [ 759.710311][ T5116] binder: 5115:5116 ioctl 89f0 20000dc0 returned -22 [ 759.721153][ T5116] binder: 5115:5116 ioctl 8955 20000e00 returned -22 00:12:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 760.672486][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 763.460761][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 766.347345][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_mr_cache\x00') close_range(r1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:12:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @local}, 0x10) r2 = accept4$inet(r1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x7, 0x1002, 0x22, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @remote, 0x20, 0x0, 0x8, 0x8f53}}) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@private, 0x4e21, 0x0, 0x4e23, 0x0, 0x8388fc2ccd010086, 0xf0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x4, 0x4, 0x5}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0xe8) listen(0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) [ 769.982348][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. 00:12:51 executing program 0: pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x0) 00:12:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_mr_cache\x00') close_range(r1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:12:54 executing program 0: 00:12:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000040)=0x80) r3 = dup3(r0, r2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000240), 0x4) 00:12:55 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x8983, &(0x7f0000000000)) 00:12:56 executing program 0: 00:12:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x84}, 0x1, 0x0, 0xcd15}, 0x0) 00:12:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 00:12:58 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x8983, &(0x7f0000000000)) 00:12:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 00:12:59 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x24, &(0x7f0000000100)={{0x0, @dev, 0x0, 0x0, 'fo\x00'}, {@broadcast}}, 0x44) 00:13:00 executing program 1: r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000001100)) fcntl$notify(r0, 0x402, 0x0) 00:13:00 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x8983, &(0x7f0000000000)) 00:13:01 executing program 1: 00:13:01 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000006c0), 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:13:02 executing program 0: r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000001100)) fcntl$notify(r0, 0x402, 0x0) 00:13:02 executing program 1: r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000001100)) fcntl$notify(r0, 0x402, 0x0) 00:13:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 00:13:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 00:13:03 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5460) 00:13:04 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x84}, 0x1, 0x0, 0xcd15}, 0x0) 00:13:04 executing program 0: r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000001100)) fcntl$notify(r0, 0x402, 0x0) 00:13:05 executing program 1: 00:13:05 executing program 0: r0 = epoll_create1(0x0) pipe2$watch_queue(&(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)) 00:13:06 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f00000003c0)={0x0, "8b0fa4d34dc0c009b7c833e411da76d9b7daf884195a41db4f1cf7980199a93d", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r1, 0x40049409, 0x0) 00:13:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x420}, 0x420}}, 0x0) 00:13:06 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x4a, &(0x7f0000000500), 0x4) 00:13:07 executing program 0: clock_gettime(0x32b42a3d0f7716a2, 0x0) [ 788.280163][ T29] audit: type=1400 audit(787.910:243): avc: denied { setopt } for pid=5192 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 00:13:08 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:13:08 executing program 0: r0 = userfaultfd(0x80001) r1 = fcntl$dupfd(r0, 0x0, r0) read$sequencer(r1, 0x0, 0x0) 00:13:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd256\x00'}}, 0x0, 0x0) 00:13:09 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd256\x00'}}, 0x0, 0x0) 00:13:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCCONS(r1, 0x541d) 00:13:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCCONS(r1, 0x541d) 00:13:11 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 00:13:12 executing program 0: r0 = userfaultfd(0x80001) r1 = fcntl$dupfd(r0, 0x0, r0) read$sequencer(r1, 0x0, 0x0) 00:13:12 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd256\x00'}}, 0x0, 0x0) 00:13:13 executing program 0: r0 = userfaultfd(0x80001) r1 = fcntl$dupfd(r0, 0x0, r0) read$sequencer(r1, 0x0, 0x0) 00:13:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCCONS(r1, 0x541d) 00:13:14 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:13:14 executing program 1: r0 = userfaultfd(0x80001) r1 = fcntl$dupfd(r0, 0x0, r0) read$sequencer(r1, 0x0, 0x0) [ 795.531330][ T5222] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2305 sclass=netlink_xfrm_socket pid=5222 comm=syz-executor.0 00:13:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd256\x00'}}, 0x0, 0x0) 00:13:15 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:13:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f00000005c0)=@known='trusted.overlay.upper\x00') [ 797.201823][ T29] audit: type=1400 audit(796.830:244): avc: denied { setattr } for pid=5227 comm="syz-executor.1" name="tty1" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 00:13:17 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:13:17 executing program 1: 00:13:18 executing program 0: 00:13:18 executing program 1: 00:13:19 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 00:13:19 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) [ 800.312548][ T5237] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2052 sclass=netlink_xfrm_socket pid=5237 comm=syz-executor.0 00:13:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/udplite6\x00') linkat(r0, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 00:13:20 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000300)) 00:13:21 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_PCM_IOCTL_DELAY(r1, 0x80084121, 0x0) 00:13:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r0, &(0x7f00000005c0)=@known='trusted.overlay.upper\x00') 00:13:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:13:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/udplite6\x00') linkat(r0, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 00:13:23 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_MAP_DMA(r1, 0x3b71, 0x0) 00:13:24 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:13:25 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000300)) 00:13:26 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x2, 0x0, &(0x7f0000000140)) 00:13:27 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup(r0) ioctl$IOMMU_VFIO_IOMMU_MAP_DMA(r1, 0x3b71, 0x0) 00:13:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 00:13:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 00:13:28 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000680), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) 00:13:29 executing program 0: r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000002f40), 0x0, 0x0) ioctl$IOMMU_IOAS_UNMAP$ALL(r0, 0x5450, 0x0) 00:13:29 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$dsp(r0, 0x0, 0x0) 00:13:30 executing program 0: faccessat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:13:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 00:13:31 executing program 0: ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x8}) r0 = socket$inet(0x2, 0xa, 0x7f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'team_slave_1\x00', {}, 0x9}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept(r1, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80) socket(0x25, 0x2, 0xcb) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x218400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=0x0) bind$nfc_llcp(r3, &(0x7f0000000200)={0x27, r4, 0x0, 0x6, 0x1, 0x7f, "88e574e5495eb508c9b25a1cb4588d2f81376faf77d4fcc323fffc8260dd62701b36584cc64b40eb5f71fd81ba3fb59f3185de78337c1b4f45806d4e5a355f", 0x37}, 0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}}, 0x84e, 0x4, 0x1, 0x81, 0x0, 0x1, 0xca}, &(0x7f0000000340)=0x9c) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)={r5, 0x4, 0xf0, "047f66c694b650a14c3394df8c4b8f67e751bac6f603f9790eb22e3abf8819dca2068231931d120f867212372d9ae44253d176ea30c8c9481624a0b7bd0b674bf5e8edc9c1f7b6fbe1f9d2a4b0d0779b2a282e404af01acb75df714f516bd1a20b3c4f24eef8ebb5a4e03283c86d33fa6c2ca97efabb0f8417db1862f67c5fa49132ff7312bc085b65335fa8067a2ae44cca31b14df425854a0abb6db002256b700eef39e36e81c7cd70dbfafb5d6c0bf7717d8bda0ba8d030535c246f2db74b284c81420fd6e1ae1368a02f433c9a5f36beeb5414f806c57818bf4722df71c4fa94053fbd5bda9156dbe7af2f3d9137"}, 0xf8) bind(0xffffffffffffffff, &(0x7f0000000480)=@rc={0x1f, @none, 0x7}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup3(r6, r2, 0x80000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f0000000500)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r7, 0x4144, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000540)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r8, 0x80047213, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000005c0)={r5, 0x40, 0x10}, &(0x7f0000000600)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000640)={r9, @in={{0x2, 0x4e24, @private=0xa010101}}}, &(0x7f0000000700)=0x84) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000740)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f0000000b40)={0x6, "f6d22fac938e45159cbbd977f669a64501d9cf3f57181dc2df742b065f9a5bb81ec9b685133c1dc5de0a870e3fe2c17b4e45f55d8d5f6fcf0e63cb7e8211a5f7", {0x7, 0x9}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000c00)={0x8, 'veth1_vlan\x00', {'wlan0\x00'}, 0x8da}) r10 = dup3(r8, r3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r10, 0x89f0, &(0x7f0000000dc0)={'sit0\x00', &(0x7f0000000c40)={'gretap0\x00', 0x0, 0x7800, 0x17, 0x51, 0x80000001, {{0x58, 0x4, 0x1, 0x3b, 0x160, 0x66, 0x0, 0x1f, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@ssrr={0x89, 0x27, 0xf4, [@multicast1, @remote, @loopback, @local, @multicast1, @broadcast, @private=0xa010100, @private=0xa010100, @private=0xa010100]}, @timestamp_addr={0x44, 0x3c, 0xac, 0x1, 0x0, [{@broadcast, 0x4}, {@local, 0x5}, {@initdev={0xac, 0x1e, 0x9, 0x0}, 0x1f}, {@multicast2, 0x800}, {@remote, 0x1}, {@private=0xa010101, 0x8}, {@broadcast, 0x290}]}, @timestamp_prespec={0x44, 0x24, 0xc8, 0x3, 0x6, [{@remote, 0x8000}, {@empty, 0x8}, {@rand_addr=0x64010101, 0x3}, {@empty, 0x2}]}, @cipso={0x86, 0x50, 0xffffffffffffffff, [{0x2, 0x11, "fe880d3eb6b9d01ee28683fbc25246"}, {0x2, 0x9, "dd1b5c0b11dd88"}, {0x1, 0x5, 'm$b'}, {0x0, 0x2}, {0x6, 0x6, "49538a25"}, {0x1, 0xf, "ca8dc370cc6d722ccc2566a3de"}, {0x6, 0x3, "d4"}, {0x0, 0x11, "0b3f4cef2e4b0747c09258abee4314"}]}, @timestamp_addr={0x44, 0x4c, 0xaa, 0x1, 0x8, [{@multicast2, 0x10}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x7}, {@empty}, {@empty, 0x1000}, {@broadcast, 0x40}, {@private=0xa010101, 0x4115}, {@broadcast, 0xffff8000}, {@local, 0x2}, {@private=0xa010102, 0xbf9}]}, @generic={0x82, 0x5, "af8165"}, @timestamp_addr={0x44, 0x24, 0x2a, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfff}, {@loopback, 0xffff5010}, {@empty, 0x7fff}, {@local, 0x5}]}]}}}}}) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000e00)={{0x2, 0x4e24, @multicast1}, {0x306, @broadcast}, 0x40, {0x2, 0x4e24, @local}, 'bridge_slave_0\x00'}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000e80)='/sys/module/dm_clone', 0x101200, 0x80) bind(r11, &(0x7f0000000ec0)=@in6={0xa, 0x4e21, 0x9, @mcast1, 0x4}, 0x80) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(0xffffffffffffffff, 0x80184132, &(0x7f0000000f80)) 00:13:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) [ 813.519962][ T5283] binder: 5274:5283 ioctl 80047213 20000580 returned -22 [ 813.666607][ T5283] binder: 5274:5283 ioctl 89f0 20000dc0 returned -22 [ 813.712735][ T5283] binder: 5274:5283 ioctl 8955 20000e00 returned -22 00:13:33 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$dsp(r0, 0x0, 0x0) 00:13:33 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000440)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0}}) 00:13:34 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$dsp(r0, 0x0, 0x0) 00:13:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 00:13:36 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000680), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) 00:13:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 00:13:37 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a40)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 00:13:37 executing program 0: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$dsp(r0, 0x0, 0x0) [ 818.835567][ T29] audit: type=1400 audit(818.460:245): avc: denied { create } for pid=5298 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 818.906991][ T29] audit: type=1400 audit(818.540:246): avc: denied { write } for pid=5298 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 00:13:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x0) dup3(r0, r1, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x58) 00:13:38 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x180100, 0x0) ioctl$VHOST_VDPA_GET_STATUS(r0, 0x5450, 0x0) 00:13:39 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) 00:13:39 executing program 1: 00:13:40 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000480)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) 00:13:40 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000480)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) 00:13:41 executing program 0: 00:13:41 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) dup3(r1, r0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) 00:13:42 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000040)) 00:13:42 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:13:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa180, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'sit0\x00', 0x0}) 00:13:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) pidfd_getfd(r2, r0, 0x0) 00:13:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0xc0045878, 0x0) 00:13:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x5411, &(0x7f0000000140)={0x3a}) 00:13:46 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000480)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00'}}, 0x118) 00:13:46 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa180, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'sit0\x00', 0x0}) 00:13:47 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) dup3(r0, r1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000040)) 00:13:47 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 00:13:48 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:13:48 executing program 1: r0 = fanotify_init(0x1, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, 0x0) 00:13:48 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa180, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f00000000c0)={'sit0\x00', 0x0}) 00:13:49 executing program 0: r0 = fanotify_init(0x1, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, 0x0) 00:13:50 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f000000acc0)={0x0, 0x0, &(0x7f000000ac80)={&(0x7f000000ac40)={0x14}, 0x14}}, 0x0) 00:13:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0xc0045878, 0x0) 00:13:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) write$cgroup_subtree(r0, 0x0, 0x8202) 00:13:51 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) [ 833.039928][ T29] audit: type=1400 audit(832.670:247): avc: denied { create } for pid=5351 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 833.078400][ T29] audit: type=1400 audit(832.710:248): avc: denied { ioctl } for pid=5351 comm="syz-executor.0" path="socket:[10877]" dev="sockfs" ino=10877 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:13:53 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:13:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) write$cgroup_subtree(r0, 0x0, 0x8202) 00:13:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x560e, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:13:55 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:13:56 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) 00:13:57 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 00:13:58 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0x4020940d, &(0x7f00000006c0)) 00:13:58 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) fcntl$setsig(r0, 0xa, 0x0) 00:13:59 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) 00:13:59 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) [ 840.547305][ T5374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5374 comm=syz-executor.1 00:14:00 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0x41}, 0x18) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000040)) 00:14:00 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x804000, &(0x7f0000000140)=ANY=[], 0x3, 0x4b0, &(0x7f0000000540)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:14:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) [ 841.798927][ T5379] loop1: detected capacity change from 0 to 512 [ 842.178590][ T5379] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 842.420226][ T29] audit: type=1400 audit(842.050:249): avc: denied { write } for pid=5376 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 842.421756][ T29] audit: type=1400 audit(842.050:250): avc: denied { remove_name } for pid=5376 comm="syz-executor.1" name="file0" dev="loop1" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 842.423049][ T29] audit: type=1400 audit(842.050:251): avc: denied { rename } for pid=5376 comm="syz-executor.1" name="file0" dev="loop1" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 842.467709][ T29] audit: type=1400 audit(842.050:252): avc: denied { add_name } for pid=5376 comm="syz-executor.1" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 842.472243][ T29] audit: type=1400 audit(842.100:253): avc: denied { unlink } for pid=5376 comm="syz-executor.1" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 842.500301][ T5379] Quota error (device loop1): do_check_range: Getting block 100663299 out of range 1-5 [ 842.502524][ T5379] Quota error (device loop1): qtree_read_dquot: Can't read quota structure for id 0 [ 842.528106][ T5379] EXT4-fs error (device loop1): ext4_acquire_dquot:6884: comm syz-executor.1: Failed to acquire dquot type 0 00:14:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOMMU_VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x0) 00:14:02 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 842.996984][ T3186] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:14:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOMMU_VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x0) 00:14:03 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) 00:14:04 executing program 0: r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0x41}, 0x18) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000040)) 00:14:04 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 00:14:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 00:14:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 00:14:05 executing program 0: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000002c0)={0x1d, r1, 0x3}, 0x18) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], 0x10}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x48) 00:14:06 executing program 1: pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0189436, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 0xd7}}) 00:14:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8902, &(0x7f0000000500)={'sit0\x00', 0x0}) 00:14:07 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x4004) 00:14:08 executing program 1: 00:14:08 executing program 1: syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x804000, &(0x7f0000000140)=ANY=[], 0x3, 0x4b0, &(0x7f0000000540)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file1\x00', 0x0) 00:14:08 executing program 0: pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r2, r1, 0x0) read$char_usb(r0, 0x0, 0x0) [ 850.070632][ T5413] loop1: detected capacity change from 0 to 512 00:14:09 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fcntl$getown(r0, 0x9) [ 850.639910][ T5413] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 850.808298][ T5413] Quota error (device loop1): do_check_range: Getting block 100663299 out of range 1-5 [ 850.809515][ T5413] Quota error (device loop1): qtree_read_dquot: Can't read quota structure for id 0 [ 850.810268][ T5413] EXT4-fs error (device loop1): ext4_acquire_dquot:6884: comm syz-executor.1: Failed to acquire dquot type 0 00:14:10 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, 0x0) [ 851.220554][ T3186] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 851.320195][ T29] audit: type=1400 audit(850.940:254): avc: denied { read } for pid=5418 comm="syz-executor.0" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 851.349779][ T29] audit: type=1400 audit(850.980:255): avc: denied { open } for pid=5418 comm="syz-executor.0" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 00:14:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8902, &(0x7f0000000500)={'sit0\x00', 0x0}) 00:14:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x5450, 0x0) 00:14:12 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000002c0)={0x1d, r1, 0x3}, 0x18) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], 0x10}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x28}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x48) 00:14:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000140)={&(0x7f0000000040), 0x10, &(0x7f0000000100)={0x0}}, 0x0) [ 854.481735][ T5430] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 00:14:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x3d, 0x0}, 0x0) close(r1) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000100)=0x8) 00:14:14 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000007c0)={0x1d, r1, 0x3}, 0x18) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:14:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x5450, 0x0) 00:14:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) unshare(0x40400) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:14:16 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000007c0)={0x1d, r1, 0x3}, 0x18) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:14:17 executing program 0: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x3e04}, 0x8, 0x0) landlock_restrict_self(r0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000016c0), 0x0, 0x0) 00:14:18 executing program 0: 00:14:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, 0x0, 0x0) 00:14:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$AUDIT_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x10}, 0x10}}, 0x0) 00:14:20 executing program 0: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x3e04}, 0x8, 0x0) landlock_restrict_self(r0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000016c0), 0x0, 0x0) 00:14:20 executing program 1: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000007c0)={0x1d, r1, 0x3}, 0x18) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 00:14:21 executing program 0: 00:14:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg$can_bcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:14:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)) 00:14:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, 0x0) 00:14:23 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000440), 0x2) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) [ 864.747678][ T29] audit: type=1400 audit(864.360:256): avc: denied { write } for pid=5459 comm="syz-executor.1" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 00:14:24 executing program 0: 00:14:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg$can_bcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:14:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg$can_bcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:14:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:14:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, 0x0) 00:14:27 executing program 1: mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x5) 00:14:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)) 00:14:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)) 00:14:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0x5451, 0x0) 00:14:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$SIOCGSKNS(r1, 0x894c, 0x0) [ 870.371534][ T29] audit: type=1400 audit(870.000:257): avc: denied { ioctl } for pid=5480 comm="syz-executor.1" path="socket:[11083]" dev="sockfs" ino=11083 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 00:14:30 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0x5451, 0x0) 00:14:30 executing program 1: 00:14:31 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000013c0), 0x2002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 00:14:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg$can_bcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 00:14:32 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$SNDCTL_TMR_TIMEBASE(r0, 0xc0045401, &(0x7f0000000a80)) 00:14:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8953, &(0x7f0000000140)={0x2, 'wlan0\x00'}) 00:14:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$SIOCGSKNS(r1, 0x894c, 0x0) 00:14:33 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40045402, 0x0) 00:14:34 executing program 1: 00:14:34 executing program 0: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x20000044) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000000)={0x2c, 0x0, r3, 0x0, r2}, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x0) 00:14:35 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40045402, 0x0) 00:14:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$SIOCGSKNS(r1, 0x894c, 0x0) 00:14:37 executing program 0: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x20000044) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000000)={0x2c, 0x0, r3, 0x0, r2}, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x0) 00:14:37 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000580), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40045402, 0x0) 00:14:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') write$P9_RVERSION(r0, 0x0, 0x0) [ 879.878877][ T29] audit: type=1400 audit(879.510:258): avc: denied { write } for pid=5516 comm="syz-executor.1" name="softnet_stat" dev="proc" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 00:14:39 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x20000044) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000000)={0x2c, 0x0, r3, 0x0, r2}, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x0) 00:14:39 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000480), 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 00:14:40 executing program 0: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x3e04}, 0x8, 0x0) landlock_restrict_self(r0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000016c0), 0x0, 0x0) 00:14:41 executing program 0: r0 = add_key(&(0x7f0000001400)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 00:14:42 executing program 1: [ 883.554768][ T29] audit: type=1400 audit(883.170:259): avc: denied { write } for pid=5527 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 00:14:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) close(r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x9c) 00:14:43 executing program 1: r0 = getpgid(0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) dup(r3) 00:14:45 executing program 0: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, 0x0, 0x20000044) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$xdp(r1, &(0x7f0000000000)={0x2c, 0x0, r3, 0x0, r2}, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x0) 00:14:45 executing program 1: r0 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x402c5829, 0x0) 00:14:46 executing program 1: r0 = landlock_create_ruleset(&(0x7f00000000c0)={0x100}, 0x10, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:14:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) close(r0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}}, 0x9c) 00:14:48 executing program 0: r0 = getpgid(0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) dup(r3) 00:14:49 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x200041) 00:14:49 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) 00:14:50 executing program 1: r0 = getpgid(0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) dup(r3) 00:14:51 executing program 0: r0 = landlock_create_ruleset(&(0x7f00000000c0)={0x100}, 0x10, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:14:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x5502, 0x0) 00:14:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x49, 0x0, 0x300) 00:14:52 executing program 0: 00:14:52 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f00000000c0)) 00:14:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x49, 0x0, 0x300) 00:14:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) getpeername$inet(r1, 0x0, 0x0) 00:14:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 00:14:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x20008054) [ 896.380965][ T29] audit: type=1400 audit(896.010:260): avc: denied { read write } for pid=5566 comm="syz-executor.0" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.418873][ T29] audit: type=1400 audit(896.040:261): avc: denied { open } for pid=5566 comm="syz-executor.0" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 00:14:56 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={0x0}}, 0x0) 00:14:56 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000140)={0x0, "21087ca182618d41723e383d02f33b50910529fb6e2b5d4304072b6eb3dca9df", 0xffffffffffffffff}) fcntl$notify(r1, 0x402, 0x0) 00:14:57 executing program 0: 00:14:57 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, r0, 0x0) 00:14:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x8010) 00:14:58 executing program 1: r0 = socket(0x11, 0xa, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={0x0}}, 0x0) 00:14:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 00:14:59 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000000c0)) 00:14:59 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, r0, 0x0) 00:15:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) getpeername$inet(r1, 0x0, 0x0) 00:15:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 00:15:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14}, 0x14}}, 0x20008054) 00:15:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000080)) 00:15:02 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, r0, 0x0) 00:15:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 00:15:03 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000040), 0x4) 00:15:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) [ 904.852196][ T29] audit: type=1400 audit(904.480:262): avc: denied { setopt } for pid=5599 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:15:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r2}, 0x18) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 00:15:05 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) 00:15:05 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0x5450, 0x0) 00:15:06 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x240, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x5450, 0x0) 00:15:06 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x240, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x5450, 0x0) 00:15:07 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf01, 0x0) 00:15:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d00)={0x14}, 0x14}}, 0x0) 00:15:08 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x281, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 00:15:08 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x240, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0x5450, 0x0) 00:15:09 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x140, 0x0) read(r0, 0x0, 0x0) 00:15:09 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0x5450, 0x0) 00:15:09 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000180), &(0x7f0000000200)=0x8) 00:15:10 executing program 0: 00:15:11 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x281, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 00:15:11 executing program 0: r0 = memfd_create(&(0x7f0000000000)='+\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0x5451, 0x0) 00:15:12 executing program 1: ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) 00:15:12 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup3(r0, r2, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18}, 0xfffffde4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30}, 0x30) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r3, r1, 0x0) 00:15:12 executing program 1: r0 = socket(0x15, 0x5, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 913.891708][ T29] audit: type=1400 audit(913.490:263): avc: denied { create } for pid=5636 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 913.995517][ T29] audit: type=1400 audit(913.600:264): avc: denied { write } for pid=5636 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 00:15:13 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = dup3(r0, r1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, 0xfffffffffffffffe) 00:15:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) write$P9_RCREATE(r1, 0x0, 0x0) 00:15:15 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:15:15 executing program 0: r0 = socket(0x15, 0x5, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 00:15:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup3(r0, r2, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18}, 0xfffffde4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30}, 0x30) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r3, r1, 0x0) 00:15:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup3(r0, r2, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18}, 0xfffffde4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30}, 0x30) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r3, r1, 0x0) 00:15:18 executing program 1: r0 = socket(0x15, 0x5, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 00:15:19 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = dup3(r0, r1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, 0xfffffffffffffffe) 00:15:19 executing program 1: r0 = memfd_create(&(0x7f0000000000)='+\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0x5451, 0x0) 00:15:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) 00:15:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup3(r0, r2, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18}, 0xfffffde4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30}, 0x30) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r3, r1, 0x0) 00:15:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup3(r0, r2, 0x0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18}, 0xfffffde4) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30}, 0x30) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(r3, r1, 0x0) 00:15:22 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = dup3(r0, r1, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, 0xfffffffffffffffe) 00:15:23 executing program 0: syz_open_dev$audion(&(0x7f0000000600), 0x1f, 0x44101) 00:15:23 executing program 1: 00:15:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, 0x0) 00:15:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RAUTH(r1, 0x0, 0x0) 00:15:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:15:25 executing program 1: ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) 00:15:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:15:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:15:55 executing program 1: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0x5450, 0x0) 00:15:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:16:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:16:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:16:27 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000380)) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0x5450, 0x0) 00:16:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 994.115193][ C0] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 32s! [ 994.122920][ C0] Showing busy workqueues and worker pools: [ 994.126054][ C0] workqueue events: flags=0x0 [ 994.127309][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=4 refcnt=5 [ 994.127839][ C0] pending: 2*nsim_dev_hwstats_traffic_work, nsim_dev_trap_report_work, vmstat_shepherd [ 994.128895][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=7 refcnt=8 [ 994.129129][ C0] in-flight: 3181:nsim_dev_trap_report_work [ 994.129695][ C0] pending: 3*psi_avgs_work, kfree_rcu_monitor, 2*bpf_prog_free_deferred [ 994.130117][ C0] workqueue events_unbound: flags=0x2 [ 994.132903][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=1 refcnt=2 [ 994.133193][ C0] pending: flush_memcg_stats_dwork [ 994.135224][ C0] workqueue events_power_efficient: flags=0x82 [ 994.135803][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=2 refcnt=3 [ 994.135972][ C0] in-flight: 54:wg_ratelimiter_gc_entries ,1082:gc_worker [ 994.136348][ C0] workqueue mm_percpu_wq: flags=0x8 [ 994.137910][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.138094][ C0] pending: vmstat_update [ 994.138245][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.138392][ C0] pending: vmstat_update [ 994.138556][ C0] workqueue kblockd: flags=0x18 [ 994.140710][ C0] pwq 3: cpus=0 node=0 flags=0x0 nice=-20 active=1 refcnt=2 [ 994.140883][ C0] pending: blk_mq_timeout_work [ 994.141286][ C0] workqueue wg-kex-wg0: flags=0x24 [ 994.142609][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.142788][ C0] pending: wg_packet_handshake_receive_worker [ 994.142960][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 994.145376][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.145573][ C0] pending: wg_packet_encrypt_worker [ 994.145721][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 994.145866][ C0] in-flight: 5703:wg_packet_tx_worker [ 994.146005][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker [ 994.146226][ C0] workqueue wg-kex-wg1: flags=0x24 [ 994.151857][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.152093][ C0] pending: wg_packet_handshake_receive_worker [ 994.152258][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 994.154755][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 994.154973][ C0] pending: wg_packet_decrypt_worker, wg_packet_encrypt_worker, wg_packet_tx_worker [ 994.155202][ C0] workqueue wg-kex-wg2: flags=0x24 [ 994.156736][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 994.156913][ C0] pending: wg_packet_handshake_receive_worker [ 994.157041][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 994.158396][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 994.158555][ C0] pending: wg_packet_decrypt_worker, wg_packet_tx_worker [ 994.158730][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 994.164886][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 994.165126][ C0] pending: wg_packet_tx_worker, wg_packet_encrypt_worker [ 994.165347][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 994.166829][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 994.167015][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 994.167248][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 994.168832][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 994.169010][ C0] pending: wg_packet_encrypt_worker, wg_packet_decrypt_worker, wg_packet_tx_worker [ 994.169801][ C0] pool 6: cpus=1 node=0 flags=0x0 nice=0 hung=32s workers=5 idle: 3318 27 3180 [ 994.170355][ C0] pool 8: cpus=0-1 flags=0x4 nice=0 hung=0s workers=6 idle: 3986 10 26 928 [ 994.170897][ C0] Showing backtraces of running workers in stalled CPU-bound worker pools: [ 994.175518][ C0] pool 6: [ 994.175939][ C0] task:kworker/1:0 state:R running task stack:0 pid:5703 tgid:5703 ppid:2 flags:0x00000008 [ 994.176739][ C0] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 994.176911][ C0] Call trace: [ 994.176958][ C0] __switch_to+0x1c8/0x2a0 [ 994.177046][ C0] __schedule+0xad8/0x2b14 [ 994.177116][ C0] preempt_schedule+0xf4/0x254 [ 994.177175][ C0] __local_bh_enable_ip+0x380/0x4a0 [ 994.177238][ C0] _raw_read_unlock_bh+0x44/0x54 [ 994.177297][ C0] wg_socket_send_skb_to_peer+0xf0/0x188 [ 994.177358][ C0] wg_packet_tx_worker+0x128/0x4e8 [ 994.177415][ C0] process_one_work+0x78c/0x1898 [ 994.177471][ C0] worker_thread+0x764/0xc24 [ 994.177525][ C0] kthread+0x27c/0x300 [ 994.177590][ C0] ret_from_fork+0x10/0x20 [ 994.177739][ C0] pool 6: [ 994.177780][ C0] task:kworker/1:3 state:R running task stack:0 pid:3181 tgid:3181 ppid:2 flags:0x00000008 [ 994.177917][ C0] Workqueue: events nsim_dev_trap_report_work [ 994.177999][ C0] Call trace: [ 994.178025][ C0] __switch_to+0x1c8/0x2a0 [ 994.178106][ C0] __schedule+0xad8/0x2b14 [ 994.178173][ C0] preempt_schedule+0xf4/0x254 [ 994.178230][ C0] _raw_spin_unlock+0x6c/0x84 [ 994.178282][ C0] nsim_dev_trap_report_work+0x6c4/0xa40 [ 994.178340][ C0] process_one_work+0x78c/0x1898 [ 994.178398][ C0] worker_thread+0x764/0xc24 [ 994.178452][ C0] kthread+0x27c/0x300 [ 994.178510][ C0] ret_from_fork+0x10/0x20 00:16:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d800000000000000024e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f9568a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d66b7cc957d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1f44ccb19e810879b70a70000000000000000000000d7900a820b6327944e9a217b9800e000002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b223fa8b148871c8d31d24291c25449f106a99893ed20fa7a050fbbef90327e827e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed200ada12f7a1525320e71666f472a97214d0b2874df30ed5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940e4ffffffffffffff000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:16:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 00:17:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)=@newqdisc={0x34, 0x24, 0x300, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x6}, {0xc, 0x5}, {0xd, 0xa}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x50}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20051) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r4, &(0x7f0000004b40)={&(0x7f00000026c0)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000004880)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200087e8, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78050a34f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03859bcecc7a95425a3a07e756d44ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) VM DIAGNOSIS: 19:27:19 Registers: info registers vcpu 0 CPU#0 PC=ffff800081934cac X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=1fffe000016ca42f X06=0000000000000030 X07=0000000000000003 X08=0000000000000004 X09=dfff800000000000 X10=ffff700010000e88 X11=1ffff00010000e88 X12=ffff700010000e89 X13=1fffe0000264514a X14=1fffe00002645170 X15=1fffe0000264514d X16=0000000000000000 X17=0000000000000000 X18=ffff000013228a70 X19=ffff00000b652080 X20=ffff8000895fb018 X21=ffff800086ef3ce0 X22=0000000000000020 X23=dfff800000000000 X24=ffff8000892fba61 X25=0000000000000002 X26=dfff800000000000 X27=0000000000000041 X28=ffff00000b652080 X29=ffff8000800073f0 X30=ffff800081934f38 SP=ffff8000800073f0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000fffffac02090:0000000000000000 Q02=0000fffffac02090:0000ffffb0d70000 Q03=0000000000000008:0000ffffb0c331ec Q04=0000fffffac02040:0000ffffb0d70408 Q05=0000aaaab3271770:0000ffffb0c2a9a8 Q06=39196ea0afad0643:342f9385112be747 Q07=336d326878714894:0cc1742a59f5dfd3 Q08=694206f97f43bf9b:ce65b3ee99ee4230 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=8cb6d9cf5f5aa5a8:2a085c2753e42841 Q12=98214823dd936bf9:8cc30d3219f728f7 Q13=f6c0fb5d6ee1b37e:b372d8873fb1d5b5 Q14=a8a55a5fcfd9b68c:4128e453275c082a Q15=5064aa5588ed7254:5064aa5588ed7254 Q16=0000fffffac022d0:0000fffffac022d0 Q17=ffffff80ffffffd0:0000fffffac022a0 Q18=85f32aa7945afb05:f096adf10f189e66 Q19=756587569b426563:4737f03b6e4167f0 Q20=0000000000000000:0000000000000000 Q21=f241878c3fd50d44:486332ef9c6c3ef7 Q22=5daae874e5000412:b4f143e30b6aea48 Q23=8cb6d9cf5f5aa5a8:2a085c2753e42841 Q24=0000020000000000:6800000000000000 Q25=cf4f7f0d0807c4bd:1bdd7e71db99470d Q26=d086061f1fc97912:17cebdaf0c13c3de Q27=14e24511c464430e:dbad3a1ccc6387b3 Q28=45b223da515066cb:953425c54e991fd9 Q29=fc49298d0b91ea01:a4e9d6b3a5f1ee62 Q30=ab70c0e35739e96e:5ca8036ff841d5dc Q31=49c2aeb2e2b26e51:b58b873fe9238450 info registers vcpu 1 CPU#1 PC=ffff800084e77d4c X00=ffff800084e77d48 X01=0000000000000003 X02=0000000000000000 X03=1fffe000022f9001 X04=1fffe000022f9002 X05=1fffe0000d513c3b X06=0000000000000001 X07=0000000000000003 X08=0000000000000004 X09=dfff800000000000 X10=ffff7000112c0f60 X11=1ffff000112c0f60 X12=ffff7000112c0f61 X13=1fffe000022f914a X14=1fffe000022f9161 X15=1fffe000022f914d X16=0000000000000006 X17=ffff7fffe41bd000 X18=ffff0000117c8a70 X19=ffff8000869569f0 X20=ffff8000869569c0 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff8000869569f0 X25=ffff80008672f000 X26=0000000000979c60 X27=1fffe0000d513c48 X28=ffff800086730708 X29=ffff800089607a00 X30=ffff800084e764ec SP=ffff800089607a00 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc9ca6430:0000000000000000 Q02=0000ffffc9ca6430:0000ffff7ed70000 Q03=0000000000000008:0000ffff7ec331ec Q04=0000ffffc9ca63e0:0000ffff7ed70408 Q05=0000aaaad00a6770:0000ffff7ec2a9a8 Q06=b5d537d9f7fbd4a4:11316022a29b2bb4 Q07=460a902bc0767ee8:4ccad126e4b4587c Q08=180e4c798f55500e:01458f121b296482 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=4437bba56211c771:04ecb573bfe086af Q12=98214823dd936bf9:8cc30d3219f728f7 Q13=f6c0fb5d6ee1b37e:b372d8873fb1d5b5 Q14=71c71162a5bb3744:af86e0bf73b5ec04 Q15=58e0f788fe4be608:58e0f788fe4be608 Q16=0000ffffc9ca6670:0000ffffc9ca6670 Q17=ffffff80ffffffd0:0000ffffc9ca6640 Q18=85f32aa7945afb05:f096adf10f189e66 Q19=756587569b426563:4737f03b6e4167f0 Q20=0000000000000000:0000000000000000 Q21=af3128ecced323d5:d2dcd321693e54c4 Q22=1ccf6a149d7414d8:c7f660deed5b3095 Q23=4437bba56211c771:04ecb573bfe086af Q24=0000020000000000:6800000000000000 Q25=cf4f7f0d0807c4bd:1bdd7e71db99470d Q26=d086061f1fc97912:17cebdaf0c13c3de Q27=14e24511c464430e:dbad3a1ccc6387b3 Q28=45b223da515066cb:953425c54e991fd9 Q29=fc49298d0b91ea01:a4e9d6b3a5f1ee62 Q30=ab70c0e35739e96e:5ca8036ff841d5dc Q31=49c2aeb2e2b26e51:b58b873fe9238450