)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000d80)={'team0\x00'})
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000ec0)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f40)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@local, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001140)=0xe8)
clock_gettime(0x0, &(0x7f0000002000))
recvmmsg(0xffffffffffffff9c, &(0x7f0000001e80), 0x0, 0x0, &(0x7f0000002040))
getsockname$packet(0xffffffffffffffff, &(0x7f0000005e40), &(0x7f0000005e80)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005f00)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000006000)=0xe8)
accept(0xffffffffffffff9c, &(0x7f0000006040)=@hci, &(0x7f00000060c0)=0x80)
accept4$packet(0xffffffffffffff9c, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006180)={'teql0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f00000061c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006200)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000066c0)={0x0, @multicast2, @remote}, &(0x7f0000006700)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006740)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000006840)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000006880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f0000006980)=0xe8)
sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000071c0)={&(0x7f0000000240), 0xc, &(0x7f0000007180)={&(0x7f00000069c0)=ANY=[]}}, 0x0)
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:29 executing program 2:
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)})
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

[ 2448.939433] audit: type=1400 audit(2000000489.300:2972): avc:  denied  { create } for  pid=26869 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2448.982040] audit: type=1400 audit(2000000489.340:2973): avc:  denied  { map } for  pid=26871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2449.019936] audit: type=1400 audit(2000000489.390:2974): avc:  denied  { map } for  pid=26872 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2449.070995] audit: type=1400 audit(2000000489.440:2975): avc:  denied  { map } for  pid=26873 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:29 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b")
syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'})
recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14)
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0)
request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb)

[ 2449.183810] audit: type=1400 audit(2000000489.550:2976): avc:  denied  { map } for  pid=26878 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:29 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0)

[ 2449.304309] audit: type=1400 audit(2000000489.670:2977): avc:  denied  { map } for  pid=26883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:29 executing program 1:
munmap(&(0x7f000018f000/0x4000)=nil, 0x4000)
perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0)
signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8)
eventfd2(0x0, 0x0)
fchmod(0xffffffffffffffff, 0x0)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400))
getuid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000007c0)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc)
stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8)
getgid()
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x13b04f2c9fa2ebd)
seccomp(0x0, 0x0, &(0x7f0000000100))
pipe2(&(0x7f0000000140), 0x0)
fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00')
syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b")

[ 2449.622102] audit: type=1400 audit(2000000489.990:2978): avc:  denied  { map } for  pid=26887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:30 executing program 4:
r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021)
write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x1}, [{}]}, 0x58)

03:41:30 executing program 4:
perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4)

[ 2449.753557] audit: type=1400 audit(2000000490.120:2979): avc:  denied  { create } for  pid=26881 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:41:30 executing program 2:
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)})
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:41:30 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0)

03:41:30 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/63, &(0x7f0000000500)=0x3f)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040))
connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480))
epoll_create1(0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080))
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108)
pipe(&(0x7f00000000c0))
ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0)
openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0)
getegid()
seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f00000005c0)})
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
prctl$void(0x0)

03:41:30 executing program 4:
perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4)

03:41:30 executing program 0:
syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6c, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000))

03:41:30 executing program 4:
perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4)

03:41:30 executing program 2:
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)})
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:41:30 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b")
syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'})
recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14)
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0)
request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb)

03:41:30 executing program 4:
perf_event_open(&(0x7f0000003040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4)

03:41:30 executing program 0:
clock_gettime(0xfffffffffffffffd, &(0x7f0000000380))
recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140))
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000440)})
ioctl$void(0xffffffffffffffff, 0x0)
setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4)
ustat(0x0, &(0x7f0000000140))
gettid()
getpgid(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f")
clock_gettime(0x0, &(0x7f0000000080))
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc)
bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180), 0x4)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8)
seccomp(0x0, 0x0, &(0x7f0000000100))
rt_sigreturn()
syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:41:30 executing program 4:
fstat(0xffffffffffffff9c, &(0x7f0000000240))
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc)
ioprio_set$uid(0x0, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140))
set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc)
gettid()
socket$nl_netfilter(0x10, 0x3, 0xc)
clock_getres(0x0, &(0x7f00000001c0))
seccomp(0x0, 0x0, &(0x7f0000000100))
signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0)
memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0)
signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8)
pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setfsuid(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getpid()
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:41:30 executing program 2:
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000240)})
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:41:30 executing program 1:
getegid()
fstat(0xffffffffffffff9c, &(0x7f00000001c0))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240))
ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280))
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$packet(0x11, 0x0, 0x300)
setgroups(0x0, &(0x7f00000002c0))
syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
restart_syscall()
syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f")
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)

03:41:31 executing program 1:
getegid()
fstat(0xffffffffffffff9c, &(0x7f00000001c0))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240))
ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280))
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$packet(0x11, 0x0, 0x300)
setgroups(0x0, &(0x7f00000002c0))
syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
restart_syscall()
syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f")
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)

03:41:31 executing program 5:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/63, &(0x7f0000000500)=0x3f)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040))
connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10)
ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480))
epoll_create1(0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080))
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108)
pipe(&(0x7f00000000c0))
ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0)
openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0)
getegid()
seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f00000005c0)})
setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
prctl$void(0x0)

03:41:31 executing program 4:
fstat(0xffffffffffffff9c, &(0x7f0000000240))
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc)
ioprio_set$uid(0x0, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140))
set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc)
gettid()
socket$nl_netfilter(0x10, 0x3, 0xc)
clock_getres(0x0, &(0x7f00000001c0))
seccomp(0x0, 0x0, &(0x7f0000000100))
signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0)
memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0)
signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8)
pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setfsuid(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getpid()
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:41:32 executing program 1:
getegid()
fstat(0xffffffffffffff9c, &(0x7f00000001c0))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240))
ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280))
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$packet(0x11, 0x0, 0x300)
setgroups(0x0, &(0x7f00000002c0))
syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
restart_syscall()
syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f")
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)

03:41:32 executing program 4:
fstat(0xffffffffffffff9c, &(0x7f0000000240))
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc)
ioprio_set$uid(0x0, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140))
set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc)
gettid()
socket$nl_netfilter(0x10, 0x3, 0xc)
clock_getres(0x0, &(0x7f00000001c0))
seccomp(0x0, 0x0, &(0x7f0000000100))
signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0)
memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0)
signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8)
pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setfsuid(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getpid()
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:41:32 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(r0, r1, 0x0)

03:41:32 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b")
syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'})
recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14)
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0)
request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb)

03:41:32 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240))
sigaltstack(&(0x7f0000c77000/0x4000)=nil, &(0x7f00000000c0))
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00')
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000001400)={0x14}, 0x14}}, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0)
rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00')
setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000200), 0xb)
accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)=""/4096, &(0x7f00000001c0)=0x1000)
ioctl$void(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000380)="428055a07d6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a42dbe0c19086d9f28fc9410feefae5e54175a55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:33 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(r0, r1, 0x0)

03:41:33 executing program 4:
fstat(0xffffffffffffff9c, &(0x7f0000000240))
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc)
ioprio_set$uid(0x0, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140))
set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc)
gettid()
socket$nl_netfilter(0x10, 0x3, 0xc)
clock_getres(0x0, &(0x7f00000001c0))
seccomp(0x0, 0x0, &(0x7f0000000100))
signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0)
memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0)
signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8)
pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setfsuid(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getpid()
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:41:33 executing program 1:
getegid()
fstat(0xffffffffffffff9c, &(0x7f00000001c0))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='[\x00'}, 0x10)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240))
ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000280))
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$packet(0x11, 0x0, 0x300)
setgroups(0x0, &(0x7f00000002c0))
syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
restart_syscall()
syz_execute_func(&(0x7f0000000040)="528055a0876969ef69dc00d990c841ff0f1837fa0f38211ac4410feefa4e2179fbe5e5f2440fe6842e292b00005df30f2af9d90131a3b786e2989f7f")
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)

03:41:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:41:34 executing program 4:
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
clock_getres(0x0, &(0x7f0000000200))
pipe2(&(0x7f0000000180), 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12)
clock_gettime(0x0, &(0x7f0000000140))
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
rt_sigreturn()
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e)
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
getpgid(0xffffffffffffffff)
getpriority(0x0, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))

[ 2454.018685] kauditd_printk_skb: 25 callbacks suppressed
[ 2454.018699] audit: type=1400 audit(2000000494.380:3005): avc:  denied  { map } for  pid=26979 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2454.062429] audit: type=1400 audit(2000000494.380:3006): avc:  denied  { map } for  pid=26981 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2454.123079] audit: type=1400 audit(2000000494.490:3009): avc:  denied  { map } for  pid=26987 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2454.150401] audit: type=1400 audit(2000000494.480:3008): avc:  denied  { create } for  pid=26967 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0
[ 2454.177106] audit: type=1400 audit(2000000494.550:3010): avc:  denied  { create } for  pid=26980 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2454.203107] audit: type=1400 audit(2000000494.470:3007): avc:  denied  { create } for  pid=26967 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2454.228241] audit: type=1326 audit(2000000494.580:3011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26980 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0
03:41:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:41:34 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

[ 2454.356443] audit: type=1400 audit(2000000494.720:3012): avc:  denied  { create } for  pid=26970 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:41:34 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

[ 2454.461908] audit: type=1400 audit(2000000494.830:3013): avc:  denied  { map } for  pid=26998 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2454.491577] audit: type=1400 audit(2000000494.830:3014): avc:  denied  { map } for  pid=26997 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:34 executing program 0:
r0 = socket(0x840000000015, 0x805, 0x0)
getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a)

03:41:35 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e)
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
syz_open_procfs(0x0, &(0x7f0000000600)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b")
syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'})
recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14)
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004d00)={&(0x7f0000000480), 0xc, &(0x7f0000004cc0)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0)
preadv(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0)
request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/rtc0\x00', 0xfffffffffffffffb)

03:41:35 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(r0, r1, 0x0)

03:41:35 executing program 0:
r0 = socket(0x840000000015, 0x805, 0x0)
getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a)

03:41:35 executing program 2:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(r0, r1, 0x0)

03:41:35 executing program 4:
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
clock_getres(0x0, &(0x7f0000000200))
pipe2(&(0x7f0000000180), 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12)
clock_gettime(0x0, &(0x7f0000000140))
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
rt_sigreturn()
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e)
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
getpgid(0xffffffffffffffff)
getpriority(0x0, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:41:35 executing program 0:
r0 = socket(0x840000000015, 0x805, 0x0)
getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a)

03:41:35 executing program 0:
r0 = socket(0x840000000015, 0x805, 0x0)
getsockopt(r0, 0x114, 0x271a, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x19a)

03:41:35 executing program 2:
madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
pipe2(&(0x7f0000000280), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:35 executing program 0:
clock_gettime(0x3, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
prctl$seccomp(0x16, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)})
ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0)
connect$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @reserved}, 0x10)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c401781322410feefae5e54175455d0f2e1a1a01dff231a3b786e2989f7f")
shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil)
shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000780)=""/100)
syz_read_part_table(0x0, 0x0, &(0x7f0000000380))
setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='-vboxnet1wlan1\x00', 0x2, 0x0)
clock_gettime(0x0, &(0x7f0000000280))
getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000180), &(0x7f0000000440)=0x4)
shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil)
ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000800))
shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0)
syz_read_part_table(0x0, 0x0, &(0x7f00000006c0))

03:41:35 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:41:35 executing program 1:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:41:35 executing program 1:
r0 = socket$inet(0x10, 0x1000080003, 0x0)
sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0)

[ 2455.548091] netlink: 'syz-executor1': attribute type 15 has an invalid length.
03:41:36 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4)
r1 = socket$packet(0x11, 0x4000000002, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10)
sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000)
sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0)

03:41:36 executing program 1:
r0 = socket$inet(0x10, 0x1000080003, 0x0)
sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0)

03:41:36 executing program 3:
rmdir(&(0x7f0000000200)='./file0\x00')
getpid()
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180))
getpgid(0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163)
sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280))
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580))
open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0))
socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0))
semget(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:41:36 executing program 4:
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
clock_getres(0x0, &(0x7f0000000200))
pipe2(&(0x7f0000000180), 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12)
clock_gettime(0x0, &(0x7f0000000140))
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
rt_sigreturn()
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e)
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
getpgid(0xffffffffffffffff)
getpriority(0x0, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:41:36 executing program 1:
r0 = socket$inet(0x10, 0x1000080003, 0x0)
sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0)

[ 2455.738332] netlink: 'syz-executor1': attribute type 15 has an invalid length.
03:41:36 executing program 1:
r0 = socket$inet(0x10, 0x1000080003, 0x0)
sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000070005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0)

[ 2455.840760] netlink: 'syz-executor1': attribute type 15 has an invalid length.
03:41:36 executing program 1:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000)
write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68)
ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300))
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096})
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0)
close(r1)
write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68)
socket$packet(0x11, 0x3, 0x300)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[])
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1})

[ 2455.930584] netlink: 'syz-executor1': attribute type 15 has an invalid length.
03:41:36 executing program 2:
madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
pipe2(&(0x7f0000000280), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:36 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4)
r1 = socket$packet(0x11, 0x4000000002, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10)
sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000)
sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0)

03:41:36 executing program 5:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
getpid()
exit(0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
getgid()
dup(0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/111)
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:41:36 executing program 1:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000)
write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68)
ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300))
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096})
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0)
close(r1)
write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68)
socket$packet(0x11, 0x3, 0x300)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[])
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1})

03:41:36 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4)
r1 = socket$packet(0x11, 0x4000000002, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10)
sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000)
sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0)

03:41:36 executing program 4:
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
clock_getres(0x0, &(0x7f0000000200))
pipe2(&(0x7f0000000180), 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12)
clock_gettime(0x0, &(0x7f0000000140))
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
rt_sigreturn()
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e)
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
getpgid(0xffffffffffffffff)
getpriority(0x0, 0x0)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x2}, 0x28, 0x0)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "76cd0108e9f18529"})
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:41:37 executing program 1:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000)
write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68)
ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300))
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096})
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0)
close(r1)
write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68)
socket$packet(0x11, 0x3, 0x300)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[])
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1})

03:41:37 executing program 3:
rmdir(&(0x7f0000000200)='./file0\x00')
getpid()
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180))
getpgid(0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163)
sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280))
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580))
open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0))
socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0))
semget(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:41:37 executing program 0:
r0 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x80000800000018, &(0x7f00000001c0)=0x7fd, 0x4)
r1 = socket$packet(0x11, 0x4000000002, 0x300)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10)
sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x6b3, &(0x7f0000001200), 0x2d4}, 0x8000)
sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000005c0), 0x22b, &(0x7f0000000740)}, 0x0)

03:41:37 executing program 1:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000)
write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68)
ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300))
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096})
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0)
close(r1)
write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000000), 0x0, &(0x7f0000000140)=""/139, 0x0, 0x2}}, 0x68)
socket$packet(0x11, 0x3, 0x300)
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[])
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1})

03:41:37 executing program 0:
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080))
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc)

03:41:37 executing program 1:
openat$full(0xffffffffffffff9c, &(0x7f0000001400)='/dev/full\x00', 0x101540, 0x0)
syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:41:37 executing program 2:
madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
pipe2(&(0x7f0000000280), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:37 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f")
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
socket(0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14)
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0)
gettid()
setpriority(0x0, 0x0, 0x0)
getpgrp(0x0)
ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0))

03:41:38 executing program 1:
r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
read(r0, &(0x7f0000000600)=""/14, 0xe)

03:41:38 executing program 5:
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000000))
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000400))
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000300), 0x0)
syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3f, 0x101000)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = gettid()
fcntl$lock(r0, 0x5, &(0x7f00000002c0)={0x3, 0x3, 0x8, 0x5, r3})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0x24})

03:41:38 executing program 1:
r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
read(r0, &(0x7f0000000600)=""/14, 0xe)

03:41:38 executing program 3:
rmdir(&(0x7f0000000200)='./file0\x00')
getpid()
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180))
getpgid(0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163)
sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280))
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580))
open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0))
socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0))
semget(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:41:38 executing program 1:
r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
read(r0, &(0x7f0000000600)=""/14, 0xe)

03:41:38 executing program 1:
r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
read(r0, &(0x7f0000000600)=""/14, 0xe)

03:41:38 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f")
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
socket(0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14)
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0)
gettid()
setpriority(0x0, 0x0, 0x0)
getpgrp(0x0)
ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0))

03:41:38 executing program 1:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:39 executing program 0:
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080))
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc)

03:41:39 executing program 1:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:39 executing program 2:
madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
pipe2(&(0x7f0000000280), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc)
ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:41:39 executing program 1:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:39 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f")
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
socket(0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14)
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0)
gettid()
setpriority(0x0, 0x0, 0x0)
getpgrp(0x0)
ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0))

[ 2459.327822] kauditd_printk_skb: 70 callbacks suppressed
[ 2459.327837] audit: type=1400 audit(2000000499.690:3085): avc:  denied  { map } for  pid=27186 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2459.568608] audit: type=1400 audit(2000000499.740:3086): avc:  denied  { map } for  pid=27187 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2459.592629] audit: type=1400 audit(2000000499.750:3087): avc:  denied  { create } for  pid=27183 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2459.617654] audit: type=1400 audit(2000000499.750:3088): avc:  denied  { create } for  pid=27183 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2459.673158] audit: type=1400 audit(2000000499.760:3089): avc:  denied  { map } for  pid=27190 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2459.721642] audit: type=1400 audit(2000000500.080:3090): avc:  denied  { map } for  pid=27191 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2459.770319] audit: type=1400 audit(2000000500.100:3091): avc:  denied  { map } for  pid=27192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:40 executing program 5:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:40 executing program 1:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

[ 2460.135836] audit: type=1400 audit(2000000500.500:3092): avc:  denied  { map } for  pid=27195 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2460.159886] audit: type=1400 audit(2000000500.510:3093): avc:  denied  { map } for  pid=27196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:40 executing program 3:
rmdir(&(0x7f0000000200)='./file0\x00')
getpid()
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180))
getpgid(0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163)
sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000280))
lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580))
open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}}}, 0x48)
ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0))
socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000007c0))
semget(0xffffffffffffffff, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005740))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005780)={{{@in=@rand_addr, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005880)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005f00)={@dev}, &(0x7f0000005f40)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006080)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000060c0)={0x0, @multicast2, @rand_addr}, &(0x7f0000006100)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006140)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000062c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006300)={{{@in=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000006400)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006440)={@dev}, &(0x7f0000006480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000006640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006700)={'gre0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000069c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000006ac0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006b00)={'team0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000080c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008100)=0x14, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:41:40 executing program 4:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f")
socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
socket(0x0, 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14)
accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0)
gettid()
setpriority(0x0, 0x0, 0x0)
getpgrp(0x0)
ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0))

[ 2460.183630] audit: type=1400 audit(2000000500.530:3094): avc:  denied  { map } for  pid=27198 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:40 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c)
r1 = socket$inet(0x2, 0x840000000003, 0x2)
setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4)
sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0)

03:41:40 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c)
r1 = socket$inet(0x2, 0x840000000003, 0x2)
setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4)
sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0)

03:41:40 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c)
r1 = socket$inet(0x2, 0x840000000003, 0x2)
setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4)
sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0)

03:41:41 executing program 0:
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080))
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc)

03:41:41 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c)
r1 = socket$inet(0x2, 0x840000000003, 0x2)
setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f00004fd000), 0x4)
sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)}}], 0x1, 0x0)

03:41:41 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0)
syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10)
ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0))
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
getuid()
getegid()
getpgid(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000a80))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf")

03:41:41 executing program 2:
socket$packet(0x11, 0x3, 0x300)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0)
gettid()
ptrace(0xffffffffffffffff, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840))
stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0))
getgroups(0x0, &(0x7f0000002940))
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0))
fstat(0xffffffffffffffff, &(0x7f0000000480))
setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getgroups(0x0, &(0x7f0000002c40))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8)
getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
gettid()
stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80))
stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40))
sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0)
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100)
syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f")

03:41:41 executing program 5:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:41 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b")
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00))
timerfd_create(0x0, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0))
socket$inet_tcp(0x2, 0x1, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0))
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000f40))
lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000))
gettid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc)
getgroups(0x0, &(0x7f0000001100))
perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0)
accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e)
perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc)
getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500))
stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580))
openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10)
openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0)
socket$packet(0x11, 0x0, 0x300)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10)
socket$nl_route(0x10, 0x3, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c)
socket$inet6(0xa, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00))
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40))
syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0)
open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8)
stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40))
syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48)
accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340))
perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000007440))
perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0)
syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0)
epoll_create1(0x0)
syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0)
syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0)
openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0)
dup2(0xffffffffffffff9c, 0xffffffffffffff9c)
openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0))
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00))
accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'})
link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00')
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10)
clock_gettime(0x0, &(0x7f00000004c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340))
setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0)
request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8)
openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0)
stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000580))
delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600))
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25)
lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0))
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940))
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0)
setgroups(0x4320, &(0x7f0000000800))
pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0)
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2)
utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}})

03:41:41 executing program 3:
prctl$setname(0x24, &(0x7f0000000040)='bdevselfcgroupself')
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200))
dup(0xffffffffffffffff)
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"})
openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000006380), &(0x7f00000063c0)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006800)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006900)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007d80), &(0x7f0000007dc0)=0x14)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")

03:41:42 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0)
syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10)
ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0))
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
getuid()
getegid()
getpgid(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000a80))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf")

03:41:42 executing program 5:
perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$inet6(0xa, 0x0, 0x0)
r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0xa, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0xff, @fr_pvc=&(0x7f0000000080)}})

03:41:42 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b")
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00))
timerfd_create(0x0, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0))
socket$inet_tcp(0x2, 0x1, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0))
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000f40))
lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000))
gettid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc)
getgroups(0x0, &(0x7f0000001100))
perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0)
accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e)
perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc)
getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500))
stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580))
openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10)
openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0)
socket$packet(0x11, 0x0, 0x300)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10)
socket$nl_route(0x10, 0x3, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c)
socket$inet6(0xa, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00))
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40))
syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0)
open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8)
stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40))
syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48)
accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340))
perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000007440))
perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0)
syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0)
epoll_create1(0x0)
syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0)
syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0)
openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0)
dup2(0xffffffffffffff9c, 0xffffffffffffff9c)
openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0))
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00))
accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'})
link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00')
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10)
clock_gettime(0x0, &(0x7f00000004c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340))
setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0)
request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8)
openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0)
stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000580))
delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600))
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25)
lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0))
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940))
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0)
setgroups(0x4320, &(0x7f0000000800))
pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0)
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2)
utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}})

03:41:42 executing program 0:
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080))
setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc)

03:41:43 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0)
syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10)
ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0))
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
getuid()
getegid()
getpgid(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000a80))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf")

03:41:43 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b")
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00))
timerfd_create(0x0, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0))
socket$inet_tcp(0x2, 0x1, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0))
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000f40))
lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000))
gettid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc)
getgroups(0x0, &(0x7f0000001100))
perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0)
accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e)
perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc)
getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500))
stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580))
openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10)
openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0)
socket$packet(0x11, 0x0, 0x300)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10)
socket$nl_route(0x10, 0x3, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c)
socket$inet6(0xa, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00))
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40))
syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0)
open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8)
stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40))
syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48)
accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340))
perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000007440))
perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0)
syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0)
epoll_create1(0x0)
syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0)
syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0)
openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0)
dup2(0xffffffffffffff9c, 0xffffffffffffff9c)
openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0))
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00))
accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'})
link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00')
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10)
clock_gettime(0x0, &(0x7f00000004c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340))
setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0)
request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8)
openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0)
stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000580))
delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600))
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25)
lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0))
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940))
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0)
setgroups(0x4320, &(0x7f0000000800))
pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0)
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2)
utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}})

03:41:43 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}})

03:41:43 executing program 2:
socket$packet(0x11, 0x3, 0x300)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0)
gettid()
ptrace(0xffffffffffffffff, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840))
stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0))
getgroups(0x0, &(0x7f0000002940))
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0))
fstat(0xffffffffffffffff, &(0x7f0000000480))
setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getgroups(0x0, &(0x7f0000002c40))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8)
getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
gettid()
stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80))
stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40))
sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0)
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100)
syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f")

03:41:44 executing program 4:
openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x505802, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uhid\x00', 0x0, 0x0)
syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='/dev/uhid\x00', 0xffffffffffffff9c}, 0x10)
ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0))
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000440)=0xfffffffffffffcb1)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400))
getuid()
getegid()
getpgid(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000a80))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f362e3ecf")

03:41:44 executing program 5:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socket$kcm(0x2, 0x3, 0x2)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x5, 0x4, 0x1}, 0x2c)

03:41:44 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0)

03:41:44 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f080240308b62b854b")
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000d00))
timerfd_create(0x0, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/relabel\x00', 0x2, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000dc0))
socket$inet_tcp(0x2, 0x1, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000e00)='syz1\x00', 0x200002, 0x0)
openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0)
socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000ec0))
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/status\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000f40))
lstat(&(0x7f0000000fc0)='./file0/../file0\x00', &(0x7f0000001000))
gettid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc)
getgroups(0x0, &(0x7f0000001100))
perf_event_open$cgroup(&(0x7f0000001180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/loop-control\x00', 0x0, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f0000001240)='/dev/fuse\x00', 0x2, 0x0)
accept$unix(0xffffffffffffff9c, &(0x7f0000001280)=@abs, &(0x7f0000001300)=0x6e)
perf_event_open(&(0x7f0000001380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc)
getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500))
stat(&(0x7f0000001540)='./file0/../file0\x00', &(0x7f0000001580))
openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000005700)='/selinux/validatetrans\x00', 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
accept$inet(0xffffffffffffffff, &(0x7f0000005740), &(0x7f0000005780)=0x10)
openat$full(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/full\x00', 0x0, 0x0)
openat$ashmem(0xffffffffffffff9c, &(0x7f0000005800)='/dev/ashmem\x00', 0x0, 0x0)
socket$packet(0x11, 0x0, 0x300)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000006b80)={&(0x7f0000006b40)="656d302d2edd2447504c2a3a2a65746831257070703000", 0xffffffffffffff9c}, 0x10)
socket$nl_route(0x10, 0x3, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c)
socket$inet6(0xa, 0x0, 0x0)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006c00))
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000006c40))
syz_open_dev$rtc(&(0x7f0000006c80)='/dev/rtc#\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000006cc0)='/selinux/load\x00', 0x2, 0x0)
open(&(0x7f0000006d00)='./file0/../file0\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f0000006d40)='/dev/urandom\x00', 0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000006d80))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006dc0)={{{@in=@local, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000006ec0)=0xe8)
stat(&(0x7f0000006f00)='./file0/../file0\x00', &(0x7f0000006f40))
syz_open_dev$loop(&(0x7f0000006fc0)='/dev/loop#\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007000)='memory.swap.current\x00', 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000007080)={&(0x7f0000007040)='./file0\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x0, 0x3, &(0x7f00000070c0), &(0x7f0000007100)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000007140)=""/216}, 0x48)
accept4$inet6(0xffffffffffffff9c, &(0x7f00000072c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000007300)=0x1c, 0x0)
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000007340))
perf_event_open$cgroup(&(0x7f00000073c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007380)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000007440))
perf_event_open$cgroup(&(0x7f00000074c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000007480)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0)
syz_open_dev$mice(&(0x7f0000007540)='/dev/input/mice\x00', 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000007580)='/dev/uhid\x00', 0x0, 0x0)
openat$selinux_load(0xffffffffffffff9c, &(0x7f00000075c0)='/selinux/load\x00', 0x2, 0x0)
epoll_create1(0x0)
syz_open_dev$evdev(&(0x7f0000007600)='/dev/input/event#\x00', 0x0, 0x0)
syz_open_dev$loop(&(0x7f0000007640)='/dev/loop#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000007680)='/dev/loop-control\x00', 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000076c0)='/dev/rtc0\x00', 0x0, 0x0)
openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000007700)='cpuset.mem_exclusive\x00', 0x2, 0x0)
openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007740)='/selinux/relabel\x00', 0x2, 0x0)
dup2(0xffffffffffffff9c, 0xffffffffffffff9c)
openat$ppp(0xffffffffffffff9c, &(0x7f0000007780)='/dev/ppp\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000077c0))
accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000007800), 0x0)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007840)='cgroup.threads\x00', 0x2, 0x0)
openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000007880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008b80), 0x0, 0x0)
openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/checkreqprot\x00', 0x0, 0x0)
ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000a00))
accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000380)={'bcsh0\x00'})
link(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00')
setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000a80)="e2af0bef4c140e779ef7f319574c2746", 0x10)
clock_gettime(0x0, &(0x7f00000004c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340))
setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000004380)=ANY=[], 0x0)
request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8)
openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0)
stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000580))
delete_module(&(0x7f0000000ac0)='wlan1vmnet0em0userwlan1\x00', 0x0)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000600))
ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000500)=""/25)
lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0))
ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000940))
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0)
setgroups(0x4320, &(0x7f0000000800))
pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/91, 0x5b, 0x0)
ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2)
utimes(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={{0x77359400}})

[ 2464.359297] kauditd_printk_skb: 46 callbacks suppressed
[ 2464.359310] audit: type=1400 audit(2000000504.730:3141): avc:  denied  { map } for  pid=27303 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:44 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}})

[ 2464.498069] audit: type=1400 audit(2000000504.860:3142): avc:  denied  { map_create } for  pid=27304 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
[ 2464.571218] audit: type=1400 audit(2000000504.890:3143): avc:  denied  { map } for  pid=27308 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2464.594559] audit: type=1400 audit(2000000504.890:3144): avc:  denied  { map } for  pid=27309 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2464.618281] audit: type=1400 audit(2000000504.900:3145): avc:  denied  { prog_load } for  pid=27304 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
[ 2464.673559] audit: type=1400 audit(2000000505.040:3146): avc:  denied  { map } for  pid=27311 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:45 executing program 4:
keyctl$set_reqkey_keyring(0x10, 0x0)
pipe(&(0x7f00000001c0))
ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200))
clock_getres(0x0, &(0x7f00000000c0))
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$key(0xf, 0x3, 0x2)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180))
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300))
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))

03:41:45 executing program 1:
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0))
pipe2(&(0x7f00000004c0), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")
ustat(0x0, &(0x7f0000000340))
syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

[ 2465.448452] audit: type=1400 audit(2000000505.810:3147): avc:  denied  { map } for  pid=27315 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2465.500923] audit: type=1400 audit(2000000505.870:3148): avc:  denied  { create } for  pid=27316 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:41:45 executing program 2:
socket$packet(0x11, 0x3, 0x300)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0)
gettid()
ptrace(0xffffffffffffffff, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840))
stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0))
getgroups(0x0, &(0x7f0000002940))
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0))
fstat(0xffffffffffffffff, &(0x7f0000000480))
setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getgroups(0x0, &(0x7f0000002c40))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8)
getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
gettid()
stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80))
stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40))
sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0)
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100)
syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f")

03:41:46 executing program 1:
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0))
pipe2(&(0x7f00000004c0), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")
ustat(0x0, &(0x7f0000000340))
syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:41:46 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}})

[ 2465.655704] audit: type=1400 audit(2000000506.020:3149): avc:  denied  { map_create } for  pid=27318 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:41:46 executing program 4:
keyctl$set_reqkey_keyring(0x10, 0x0)
pipe(&(0x7f00000001c0))
ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200))
clock_getres(0x0, &(0x7f00000000c0))
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$key(0xf, 0x3, 0x2)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180))
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300))
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))

[ 2465.702491] audit: type=1400 audit(2000000506.020:3150): avc:  denied  { map_create } for  pid=27318 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:41:46 executing program 5:
prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getegid()
syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f")

03:41:46 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0)

03:41:46 executing program 1:
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0))
pipe2(&(0x7f00000004c0), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")
ustat(0x0, &(0x7f0000000340))
syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:41:46 executing program 1:
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0))
pipe2(&(0x7f00000004c0), 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")
ustat(0x0, &(0x7f0000000340))
syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:41:46 executing program 1:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:46 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0)
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0105303, &(0x7f0000000000)={{0x0, 0x1}})

03:41:46 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0)

03:41:46 executing program 3:
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300))
inotify_init1(0x0)
prctl$void(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8))
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace(0xffffffffffffffff, 0x0)
ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340))
getgid()
keyctl$chown(0x4, 0x0, 0x0, 0x0)
shutdown(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8)

03:41:46 executing program 2:
socket$packet(0x11, 0x3, 0x300)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0)
gettid()
ptrace(0xffffffffffffffff, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002840))
stat(&(0x7f0000002880)='\x00', &(0x7f00000028c0))
getgroups(0x0, &(0x7f0000002940))
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000002980))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0))
fstat(0xffffffffffffffff, &(0x7f0000000480))
setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002b00)='/-\x00'}, 0x30)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getgroups(0x0, &(0x7f0000002c40))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002cc0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000002c80)='/dev/full\x00'}, 0xfffffffffffffff8)
getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
gettid()
stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80))
stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40))
sendmsg$unix(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000027c0), 0x0, &(0x7f0000002fc0)}, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000440))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0)
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000002c0)=""/100)
syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f")

03:41:47 executing program 4:
keyctl$set_reqkey_keyring(0x10, 0x0)
pipe(&(0x7f00000001c0))
ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200))
clock_getres(0x0, &(0x7f00000000c0))
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$key(0xf, 0x3, 0x2)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180))
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300))
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))

03:41:47 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070")
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58)
r2 = accept$alg(r1, 0x0, 0x0)
sendmmsg(r2, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0xf6}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x141, &(0x7f00000076c0), 0x10}}], 0x4000000000003d5, 0x0)

03:41:47 executing program 1:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:47 executing program 5:
prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getegid()
syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f")

03:41:47 executing program 0:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:47 executing program 3:
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300))
inotify_init1(0x0)
prctl$void(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8))
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace(0xffffffffffffffff, 0x0)
ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340))
getgid()
keyctl$chown(0x4, 0x0, 0x0, 0x0)
shutdown(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8)

03:41:47 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18)
getgid()
syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f")
accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80)
utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0))
recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14)

03:41:47 executing program 4:
keyctl$set_reqkey_keyring(0x10, 0x0)
pipe(&(0x7f00000001c0))
ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200))
clock_getres(0x0, &(0x7f00000000c0))
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$key(0xf, 0x3, 0x2)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14)
fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180))
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc)
ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300))
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000))

03:41:47 executing program 1:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:48 executing program 5:
prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getegid()
syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f")

03:41:48 executing program 1:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:48 executing program 0:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:48 executing program 4:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22})
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1})
r1 = userfaultfd(0x0)
close(r1)
clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180))
read(r0, &(0x7f0000000400)=""/100, 0x64)
socket$inet6(0xa, 0x0, 0x0)
ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}})

03:41:48 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18)
getgid()
syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f")
accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80)
utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0))
recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14)

03:41:48 executing program 4:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22})
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1})
r1 = userfaultfd(0x0)
close(r1)
clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180))
read(r0, &(0x7f0000000400)=""/100, 0x64)
socket$inet6(0xa, 0x0, 0x0)
ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}})

03:41:49 executing program 4:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22})
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1})
r1 = userfaultfd(0x0)
close(r1)
clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180))
read(r0, &(0x7f0000000400)=""/100, 0x64)
socket$inet6(0xa, 0x0, 0x0)
ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}})

03:41:49 executing program 3:
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300))
inotify_init1(0x0)
prctl$void(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8))
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace(0xffffffffffffffff, 0x0)
ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340))
getgid()
keyctl$chown(0x4, 0x0, 0x0, 0x0)
shutdown(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8)

03:41:49 executing program 4:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22})
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00003e3000/0x1000)=nil, 0x1000}, 0x1})
r1 = userfaultfd(0x0)
close(r1)
clone(0x0, &(0x7f0000001f37), &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000180))
read(r0, &(0x7f0000000400)=""/100, 0x64)
socket$inet6(0xa, 0x0, 0x0)
ioctl$UFFDIO_REGISTER(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}})

03:41:49 executing program 1:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0)
ioctl(r0, 0xc0184908, &(0x7f0000001000))

03:41:49 executing program 1:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0)
ioctl(r0, 0xc0184908, &(0x7f0000001000))

03:41:49 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

03:41:49 executing program 5:
prctl$setname(0x29, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0)
signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getegid()
syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f")

03:41:49 executing program 1:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0)
ioctl(r0, 0xc0184908, &(0x7f0000001000))

[ 2469.810597] kauditd_printk_skb: 47 callbacks suppressed
[ 2469.810612] audit: type=1400 audit(2000000510.170:3198): avc:  denied  { map } for  pid=27475 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:50 executing program 0:
r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)="637075092609360a00ff00dc2edfbb6bad1bf3f65f7c53933e9415236291ecf212bbd0cd30a4daa8e16f2abd7d4556ba36aeee2834e48d1708a7b03447c238fb1994df114a450298506d0f2898ff055bd9ad7ca3c9597ef4f7f9469cf08348b512de4d80321fa68a891c")
ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0)
set_mempolicy(0x8003, &(0x7f0000000380)=0x5, 0x5)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x4)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[], 0x0)
getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f00000001c0)=0xc)
read$FUSE(r0, &(0x7f0000000700), 0x1000)

03:41:50 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18)
getgid()
syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f")
accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80)
utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0))
recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14)

03:41:50 executing program 1:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, 0x2172, 0xffffffffffffffff, 0x0)
ioctl(r0, 0xc0184908, &(0x7f0000001000))

03:41:50 executing program 3:
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300))
inotify_init1(0x0)
prctl$void(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8)
ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8))
ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace(0xffffffffffffffff, 0x0)
ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f})
ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340))
getgid()
keyctl$chown(0x4, 0x0, 0x0, 0x0)
shutdown(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002000)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8)

[ 2469.846057] audit: type=1400 audit(2000000510.170:3199): avc:  denied  { map } for  pid=27466 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3192/bus" dev="sda1" ino=17133 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
03:41:50 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

03:41:50 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

[ 2469.922150] audit: type=1400 audit(2000000510.290:3200): avc:  denied  { map } for  pid=27481 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2469.966380] audit: type=1400 audit(2000000510.330:3201): avc:  denied  { map } for  pid=27482 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2470.032905] audit: type=1400 audit(2000000510.400:3202): avc:  denied  { map } for  pid=27488 comm="syz-executor1" path="/root/syzkaller-testdir032991155/syzkaller.p57T6G/3376/bus" dev="sda1" ino=17142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
[ 2470.141132] audit: type=1400 audit(2000000510.430:3203): avc:  denied  { map } for  pid=27490 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3193/bus" dev="sda1" ino=17143 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
03:41:51 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

03:41:51 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

[ 2470.992203] audit: type=1400 audit(2000000511.360:3204): avc:  denied  { map } for  pid=27495 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2471.124389] audit: type=1400 audit(2000000511.380:3205): avc:  denied  { map } for  pid=27498 comm="syz-executor1" path="/root/syzkaller-testdir032991155/syzkaller.p57T6G/3377/bus" dev="sda1" ino=17142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
[ 2471.198488] audit: type=1400 audit(2000000511.390:3206): avc:  denied  { map } for  pid=27496 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3194/bus" dev="sda1" ino=17143 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
03:41:52 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

03:41:52 executing program 1:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
setxattr(&(0x7f00000000c0)='\x00', &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='\x00', 0x1, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0)

[ 2471.977890] audit: type=1400 audit(2000000512.340:3207): avc:  denied  { map } for  pid=27502 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3195/bus" dev="sda1" ino=17146 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
03:41:53 executing program 5:
futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200))
getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0xffffffffffffffaa)
syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0)
ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080))
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0x20)
write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18)
add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff9)
set_robust_list(&(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, 0x18)
pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)})
pipe(&(0x7f0000000080))
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c)
socket$inet_udp(0x2, 0x2, 0x0)
ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc)
gettid()
getpid()
getpgid(0xffffffffffffffff)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500))
getpgrp(0x0)
getpgrp(0x0)
ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000340))
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0)
setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4)
openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0)
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
fcntl$setflags(0xffffffffffffffff, 0x2, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10)
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:53 executing program 3:
rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8)
sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"})
prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})
clock_adjtime(0x0, &(0x7f0000000240))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
prctl$intptr(0x0, 0x0)
ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010)
gettid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
getpgid(0x0)
lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0))
ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480))
fstat(0xffffffffffffffff, &(0x7f0000001c40))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001e40))
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0))
getuid()
getegid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00))
getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0))

03:41:53 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='\'\x00'}, 0x10)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18)
getgid()
syz_execute_func(&(0x7f00000024c0)="428055a0c66969ef69dc00d99038e339392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f")
accept(0xffffffffffffffff, &(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000002300)=0x80)
utimensat(0xffffffffffffffff, &(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={{0x0, 0x2710}}, 0x0)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0))
recvmmsg(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002400)=0x14)

03:41:53 executing program 4:
futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680})
syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8)
getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc)
recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:53 executing program 1:
mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0)
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:41:53 executing program 0:
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff)
r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1)
r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)})

03:41:54 executing program 1:
mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0)
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:41:54 executing program 4:
futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680})
syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8)
getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc)
recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:55 executing program 1:
mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0)
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:41:55 executing program 4:
futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680})
syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8)
getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc)
recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:55 executing program 0:
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff)
r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1)
r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)})

03:41:55 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0)
request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280))
socket$inet6_dccp(0xa, 0x6, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

[ 2474.826586] kauditd_printk_skb: 12 callbacks suppressed
[ 2474.826601] audit: type=1400 audit(2000000515.190:3220): avc:  denied  { create } for  pid=27542 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2474.963152] audit: type=1400 audit(2000000515.330:3221): avc:  denied  { map } for  pid=27545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:56 executing program 4:
futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000007600), 0x0, 0x0, &(0x7f0000007800)={0x0, 0x989680})
syz_genetlink_get_family_id$team(&(0x7f0000007880)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000078c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000079c0)=0xe8)
getsockname(0xffffffffffffff9c, &(0x7f0000007a00)=@xdp, &(0x7f0000007a80)=0x80)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007b80)={@rand_addr, @loopback}, &(0x7f0000003600)=0xc)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007c40)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007e80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007fc0)={@dev}, &(0x7f0000008000)=0x14)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000008080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000080c0)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000008100)={{}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000008200)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f0000008340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000083c0)=0x80, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000085c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008640)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008680)={'nr0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000086c0)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008700)={@dev, @multicast1}, &(0x7f0000008740)=0xc)
recvmmsg(0xffffffffffffff9c, &(0x7f000000ee00), 0x0, 0x0, &(0x7f000000efc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f000)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f000000f100)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f180)={{{@in6=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f000000f280)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f340)={{{@in6=@local, @in6=@remote}}, {{@in6}}}, &(0x7f000000f440)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000f780)={0x0, @loopback, @broadcast}, &(0x7f000000f7c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000f800)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010f00)={@empty, @multicast2}, &(0x7f0000010f40)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

[ 2475.703275] audit: type=1400 audit(2000000516.070:3222): avc:  denied  { map } for  pid=27548 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:56 executing program 3:
rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8)
sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"})
prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})
clock_adjtime(0x0, &(0x7f0000000240))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
prctl$intptr(0x0, 0x0)
ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010)
gettid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
getpgid(0x0)
lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0))
ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480))
fstat(0xffffffffffffffff, &(0x7f0000001c40))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001e40))
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0))
getuid()
getegid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00))
getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0))

03:41:56 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170)

03:41:56 executing program 1:
mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0)
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

[ 2475.736561] audit: type=1400 audit(2000000516.090:3223): avc:  denied  { map } for  pid=27551 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2475.767769] audit: type=1400 audit(2000000516.090:3224): avc:  denied  { map } for  pid=27549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:56 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r0, &(0x7f0000000000), 0x10)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8)

[ 2475.793318] audit: type=1400 audit(2000000516.160:3225): avc:  denied  { create } for  pid=27550 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2475.825463] audit: type=1400 audit(2000000516.190:3226): avc:  denied  { map } for  pid=27554 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:56 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r0, &(0x7f0000000000), 0x10)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8)

03:41:56 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r0, &(0x7f0000000000), 0x10)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8)

03:41:56 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
bind$can_raw(r0, &(0x7f0000000000), 0x10)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)="2b90365c824c5b00", 0x8)

03:41:56 executing program 4:
syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)='XFSB', 0x4}], 0x0, &(0x7f0000000040))

03:41:56 executing program 4:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f00000020c0), 0x1000)
llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=""/222, 0x74)
r1 = gettid()
timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
tkill(r1, 0x15)
poll(&(0x7f0000000380)=[{r0}], 0x1, 0xff)
write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f00000030c0), 0x1000)

03:41:56 executing program 0:
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff)
r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1)
r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)})

[ 2476.180026] audit: type=1400 audit(2000000516.550:3227): avc:  denied  { map } for  pid=27580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2476.252161] audit: type=1400 audit(2000000516.620:3228): avc:  denied  { map } for  pid=27582 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2476.474663] audit: type=1400 audit(2000000516.840:3229): avc:  denied  { map } for  pid=27585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:41:57 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0)
request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280))
socket$inet6_dccp(0xa, 0x6, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:41:57 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170)

03:41:57 executing program 4:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:57 executing program 0:
r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff)
r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe)
r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f00000007c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49c751bd02bbf3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb", 0xc0, r1)
r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffe)
keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r3}, &(0x7f00000004c0)=""/155, 0x9b, &(0x7f0000000600)={&(0x7f0000000580)={'sha256-avx\x00'}, &(0x7f0000000100)})

03:41:57 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f")
openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000240))
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
getuid()
syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00')
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6)
keyctl$get_persistent(0x16, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68)

03:41:57 executing program 3:
rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8)
sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"})
prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})
clock_adjtime(0x0, &(0x7f0000000240))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
prctl$intptr(0x0, 0x0)
ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010)
gettid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
getpgid(0x0)
lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0))
ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480))
fstat(0xffffffffffffffff, &(0x7f0000001c40))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001e40))
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0))
getuid()
getegid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00))
getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0))

03:41:58 executing program 4:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f")
openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000240))
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
getuid()
syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00')
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6)
keyctl$get_persistent(0x16, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68)

03:41:58 executing program 4:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:58 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f")
openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000240))
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
getuid()
syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00')
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6)
keyctl$get_persistent(0x16, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68)

03:41:59 executing program 4:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:41:59 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170)

03:41:59 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0)
request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280))
socket$inet6_dccp(0xa, 0x6, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:41:59 executing program 0:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10)
signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0)
socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300))
syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4)
getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:41:59 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f")
openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f0000000240))
ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0)
getuid()
syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00')
preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6)
keyctl$get_persistent(0x16, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001740)={'syzkaller1\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast1}, &(0x7f0000001980)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f00000019c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a00)=0x14, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001b40)=0xe8)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000001680)=""/68)

03:42:00 executing program 4:
clock_gettime(0x5, &(0x7f00000002c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:42:00 executing program 1:
syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
clock_gettime(0x0, &(0x7f0000000380))
dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

[ 2480.373596] kauditd_printk_skb: 14 callbacks suppressed
[ 2480.373609] audit: type=1400 audit(2000000520.740:3244): avc:  denied  { map } for  pid=27637 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2480.441331] audit: type=1400 audit(2000000520.780:3245): avc:  denied  { create } for  pid=27638 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:01 executing program 3:
rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8)
sigaltstack(&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cebc13dc21623e8bbcb5fe12d1e6cf047c366a5325bdfd3ca4c17406e2c1b974909f418162850f2065301fb22079230b77b33bbaa94fd671e678801407f8b38e", "578859d0f2b6e11d1a26f2399e6b63a1033061b4d12685e46337cc495660244c"})
prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})
clock_adjtime(0x0, &(0x7f0000000240))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da051c403f963b7005f38c6030f01ee0dce41cbfff00fba35c68600007cc4a17c5a210f0d1df1000000c4a2c1a6b5a45800000feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
prctl$intptr(0x0, 0x0)
ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010)
gettid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xfffffffffffffe1e)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
getpgid(0x0)
lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0))
ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000480))
fstat(0xffffffffffffffff, &(0x7f0000001c40))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001cc0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001e00)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001e40))
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ec0))
getuid()
getegid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f00))
getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0))

03:42:01 executing program 4:
clock_gettime(0x5, &(0x7f00000002c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

[ 2481.130697] audit: type=1400 audit(2000000521.500:3246): avc:  denied  { map } for  pid=27647 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2481.214640] audit: type=1400 audit(2000000521.580:3247): avc:  denied  { create } for  pid=27638 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:01 executing program 1:
syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
clock_gettime(0x0, &(0x7f0000000380))
dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:01 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket(0x20000000000000a, 0x2, 0x0)
getsockopt$sock_buf(r1, 0x1, 0x12, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170)

[ 2481.307940] audit: type=1400 audit(2000000521.670:3248): avc:  denied  { map } for  pid=27657 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2481.341203] audit: type=1400 audit(2000000521.710:3249): avc:  denied  { create } for  pid=27658 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2481.761543] audit: type=1400 audit(2000000522.130:3250): avc:  denied  { map } for  pid=27661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:02 executing program 4:
clock_gettime(0x5, &(0x7f00000002c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:42:02 executing program 0:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10)
signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0)
socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300))
syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4)
getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:02 executing program 1:
syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
clock_gettime(0x0, &(0x7f0000000380))
dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

[ 2482.131819] audit: type=1400 audit(2000000522.500:3251): avc:  denied  { map } for  pid=27666 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2482.202499] audit: type=1400 audit(2000000522.570:3252): avc:  denied  { map } for  pid=27667 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2482.244756] audit: type=1400 audit(2000000522.610:3253): avc:  denied  { create } for  pid=27668 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:03 executing program 5:
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x3ffd, 0x0)
request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9)
ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280))
socket$inet6_dccp(0xa, 0x6, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:42:03 executing program 4:
clock_gettime(0x5, &(0x7f00000002c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:42:03 executing program 2:
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0/file0/../file0\x00', &(0x7f0000001740)='bpf\x00', 0x0, &(0x7f0000001780))
mount$bpf(0x0, &(0x7f0000001700)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f00000016c0)=ANY=[])
mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480))
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[])
mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[])
mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x40000, &(0x7f00000000c0))

03:42:03 executing program 3:
syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080))
syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
unshare(0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0))
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8)
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
getpgid(0xffffffffffffffff)
getpgrp(0x0)
gettid()
syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73")
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc)
seccomp(0x0, 0x0, &(0x7f0000000100))
lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640))

03:42:03 executing program 1:
syz_open_dev$dspn(0xffffffffffffffff, 0x0, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
clock_gettime(0x0, &(0x7f0000000380))
dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:04 executing program 4:
clock_getres(0x9, &(0x7f0000000200))
ustat(0x0, &(0x7f0000000140))
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b)
getpgid(0xffffffffffffffff)
open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
setns(0xffffffffffffffff, 0x0)
accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80)
seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)})
syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc)

03:42:04 executing program 1:
getrusage(0x0, &(0x7f00000006c0))
epoll_create(0x0)
fstat(0xffffffffffffffff, &(0x7f0000000280))
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200))
rt_sigpending(&(0x7f0000000080), 0x8)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}})
io_setup(0x0, &(0x7f0000000340))
signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500))
rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd)
keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0)
shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
prctl$seccomp(0x16, 0x0, &(0x7f0000000040))

03:42:04 executing program 0:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10)
signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0)
socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300))
syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4)
getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:05 executing program 4:
clock_getres(0x9, &(0x7f0000000200))
ustat(0x0, &(0x7f0000000140))
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b)
getpgid(0xffffffffffffffff)
open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
setns(0xffffffffffffffff, 0x0)
accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80)
seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)})
syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc)

03:42:05 executing program 2:
clock_gettime(0x3, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
prctl$seccomp(0x16, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='-vboxnet1wlan1\x00', 0xf, 0x0)
clock_gettime(0x0, &(0x7f0000000280))
rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0), 0x8)
syz_open_dev$mice(&(0x7f00000005c0)='/dev/input/mice\x00', 0x0, 0x0)
openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
geteuid()
getegid()
fchown(0xffffffffffffffff, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000380)=""/104, &(0x7f0000000480)=0x68)
ppoll(&(0x7f0000000500), 0x0, &(0x7f0000000540)={0x77359400}, &(0x7f0000000580), 0x8)

03:42:05 executing program 1:
getrusage(0x0, &(0x7f00000006c0))
epoll_create(0x0)
fstat(0xffffffffffffffff, &(0x7f0000000280))
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200))
rt_sigpending(&(0x7f0000000080), 0x8)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}})
io_setup(0x0, &(0x7f0000000340))
signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500))
rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd)
keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0)
shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
prctl$seccomp(0x16, 0x0, &(0x7f0000000040))

03:42:05 executing program 4:
clock_getres(0x9, &(0x7f0000000200))
ustat(0x0, &(0x7f0000000140))
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b)
getpgid(0xffffffffffffffff)
open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
setns(0xffffffffffffffff, 0x0)
accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80)
seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)})
syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc)

[ 2485.534960] kauditd_printk_skb: 12 callbacks suppressed
[ 2485.534974] audit: type=1400 audit(2000000525.900:3266): avc:  denied  { map } for  pid=27711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2485.659204] audit: type=1400 audit(2000000526.030:3267): avc:  denied  { create } for  pid=27712 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:06 executing program 1:
getrusage(0x0, &(0x7f00000006c0))
epoll_create(0x0)
fstat(0xffffffffffffffff, &(0x7f0000000280))
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200))
rt_sigpending(&(0x7f0000000080), 0x8)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}})
io_setup(0x0, &(0x7f0000000340))
signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500))
rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd)
keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0)
shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
prctl$seccomp(0x16, 0x0, &(0x7f0000000040))

03:42:06 executing program 0:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10)
signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0)
socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300))
syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffff9c})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680), 0x4)
getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000480)=0xb0)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000580)=ANY=[], &(0x7f00000004c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:06 executing program 5:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]})
ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174)

[ 2485.736148] audit: type=1400 audit(2000000526.100:3268): avc:  denied  { map } for  pid=27715 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2485.805820] audit: type=1400 audit(2000000526.170:3269): avc:  denied  { map } for  pid=27720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2485.836873] audit: type=1400 audit(2000000526.180:3270): avc:  denied  { map } for  pid=27719 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:06 executing program 3:
syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080))
syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
unshare(0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0))
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8)
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
getpgid(0xffffffffffffffff)
getpgrp(0x0)
gettid()
syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73")
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc)
seccomp(0x0, 0x0, &(0x7f0000000100))
lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640))

03:42:06 executing program 4:
clock_getres(0x9, &(0x7f0000000200))
ustat(0x0, &(0x7f0000000140))
socket$inet6_udp(0xa, 0x2, 0x0)
setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b)
getpgid(0xffffffffffffffff)
open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
setns(0xffffffffffffffff, 0x0)
accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80)
seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f00000001c0)})
syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000400)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'sit0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @rand_addr, @local}, &(0x7f0000000c00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'irlan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'veth1_to_team\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast2, @rand_addr}, &(0x7f0000000d00)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'ip6gretap0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@ipv4={[], [], @broadcast}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002380)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002480)={@dev, @local}, &(0x7f00000024c0)=0xc)

[ 2486.515600] audit: type=1400 audit(2000000526.880:3271): avc:  denied  { map } for  pid=27727 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2486.599484] audit: type=1400 audit(2000000526.970:3272): avc:  denied  { create } for  pid=27723 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:07 executing program 1:
getrusage(0x0, &(0x7f00000006c0))
epoll_create(0x0)
fstat(0xffffffffffffffff, &(0x7f0000000280))
memfd_create(&(0x7f00000001c0)='.\x00', 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200))
rt_sigpending(&(0x7f0000000080), 0x8)
ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000240)={'bond0\x00', {0x2, 0x0, @broadcast}})
io_setup(0x0, &(0x7f0000000340))
signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500))
rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c4211de362bf1837c4c3397c2a060f38211a40a5c19086d9f28fc9410f5eeefafae54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)})
add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffd)
keyctl$update(0x2, 0x0, &(0x7f0000000780), 0x0)
shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
shmctl$IPC_RMID(0x0, 0x0)
prctl$seccomp(0x16, 0x0, &(0x7f0000000040))

[ 2486.692101] audit: type=1400 audit(2000000527.060:3273): avc:  denied  { map } for  pid=27729 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:07 executing program 4:
prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43)
getrusage(0x0, &(0x7f0000000240))
socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0))
accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0)
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
pipe(&(0x7f0000000040))
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880))
clock_gettime(0x0, &(0x7f0000000580))
setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740))
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0))

03:42:08 executing program 1:
clock_gettime(0xa8000000, &(0x7f00000001c0))
perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc))
syz_open_pts(0xffffffffffffffff, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000))
fstat(0xffffffffffffffff, &(0x7f00000028c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180))
fstat(0xffffffffffffffff, &(0x7f0000004240))
recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'})
ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17)
accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80))
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[])
syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14)

[ 2487.675700] audit: type=1400 audit(2000000528.040:3274): avc:  denied  { map } for  pid=27739 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:08 executing program 4:
prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43)
getrusage(0x0, &(0x7f0000000240))
socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0))
accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0)
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
pipe(&(0x7f0000000040))
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880))
clock_gettime(0x0, &(0x7f0000000580))
setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740))
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0))

[ 2488.936909] audit: type=1400 audit(2000000529.300:3275): avc:  denied  { map } for  pid=27752 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:09 executing program 2:
signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0))
eventfd2(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[])
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194)
signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0))
getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680))
getgid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00))
getgid()
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000b40))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getpgrp(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00))
lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80))
lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8)
lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc)
stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0))
getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc)
lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc)
getpid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8)
getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:09 executing program 1:
clock_gettime(0xa8000000, &(0x7f00000001c0))
perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc))
syz_open_pts(0xffffffffffffffff, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000))
fstat(0xffffffffffffffff, &(0x7f00000028c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180))
fstat(0xffffffffffffffff, &(0x7f0000004240))
recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'})
ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17)
accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80))
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[])
syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14)

03:42:09 executing program 0:
capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24)

03:42:09 executing program 4:
prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43)
getrusage(0x0, &(0x7f0000000240))
socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0))
accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0)
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
pipe(&(0x7f0000000040))
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880))
clock_gettime(0x0, &(0x7f0000000580))
setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740))
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0))

03:42:10 executing program 1:
clock_gettime(0xa8000000, &(0x7f00000001c0))
perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc))
syz_open_pts(0xffffffffffffffff, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000))
fstat(0xffffffffffffffff, &(0x7f00000028c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180))
fstat(0xffffffffffffffff, &(0x7f0000004240))
recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'})
ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17)
accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80))
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[])
syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14)

03:42:10 executing program 5:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]})
ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174)

03:42:10 executing program 3:
syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080))
syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
unshare(0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0))
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8)
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
getpgid(0xffffffffffffffff)
getpgrp(0x0)
gettid()
syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73")
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc)
seccomp(0x0, 0x0, &(0x7f0000000100))
lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640))

03:42:10 executing program 4:
prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43)
getrusage(0x0, &(0x7f0000000240))
socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0))
accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0)
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
pipe(&(0x7f0000000040))
ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000380)=""/65)
setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880))
clock_gettime(0x0, &(0x7f0000000580))
setitimer(0x0, &(0x7f0000000680)={{0x77359400}}, &(0x7f0000000740))
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='ipddp0\x00', 0x10)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000900), 0x1ae5f1dddaa7cdee}, 0x0)
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0))

03:42:11 executing program 1:
clock_gettime(0xa8000000, &(0x7f00000001c0))
perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc))
syz_open_pts(0xffffffffffffffff, 0x0)
ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0)
ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000))
fstat(0xffffffffffffffff, &(0x7f00000028c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180))
fstat(0xffffffffffffffff, &(0x7f0000004240))
recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400})
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'})
ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17)
accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80))
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[])
syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0)
bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14)

[ 2490.700878] kauditd_printk_skb: 4 callbacks suppressed
[ 2490.700892] audit: type=1400 audit(2000000531.070:3280): avc:  denied  { map } for  pid=27778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:11 executing program 4:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x10, 0x3, 0x6)
sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:11 executing program 4:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x10, 0x3, 0x6)
sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

[ 2490.912301] audit: type=1400 audit(2000000531.280:3281): avc:  denied  { map } for  pid=27785 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:11 executing program 4:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x10, 0x3, 0x6)
sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

[ 2491.072149] audit: type=1400 audit(2000000531.440:3282): avc:  denied  { map } for  pid=27796 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:11 executing program 2:
signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0))
eventfd2(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[])
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194)
signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0))
getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680))
getgid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00))
getgid()
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000b40))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getpgrp(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00))
lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80))
lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8)
lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc)
stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0))
getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc)
lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc)
getpid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8)
getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:11 executing program 4:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$inet(0x10, 0x3, 0x6)
sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:11 executing program 0:
capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24)

03:42:11 executing program 1:
perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timerfd_create(0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
dup2(0xffffffffffffff9c, 0xffffffffffffffff)
getpid()
getpgid(0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
fstat(0xffffffffffffffff, &(0x7f0000000480))
getgid()
stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500))
fstat(0xffffffffffffffff, &(0x7f0000000580))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8)
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce)
fstat(0xffffffffffffffff, &(0x7f0000000940))
lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getegid()
geteuid()
getgid()
getuid()
fstat(0xffffffffffffffff, &(0x7f00000021c0))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000002240))
lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300))

[ 2491.560374] audit: type=1400 audit(2000000531.930:3283): avc:  denied  { map } for  pid=27798 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:12 executing program 4:
pipe2$9p(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}]}})
write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000004000000000000001d0000000000000000000000000000000007002e2f66696c6530"], 0x2a)
write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RLERRORu(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="13000000070100060067584c"], 0xc)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})
umount2(&(0x7f0000000500)='./file0\x00', 0x0)

[ 2491.677263] audit: type=1400 audit(2000000532.040:3284): avc:  denied  { map } for  pid=27803 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2491.726631] 9pnet: Insufficient options for proto=fd
[ 2491.740626] 9pnet: Insufficient options for proto=fd
03:42:12 executing program 5:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]})
ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174)

[ 2492.136618] audit: type=1400 audit(2000000532.500:3285): avc:  denied  { map } for  pid=27813 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2492.220105] audit: type=1400 audit(2000000532.590:3286): avc:  denied  { map } for  pid=27815 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:12 executing program 3:
syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080))
syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
unshare(0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0))
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x479, &(0x7f00000002c0)})
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000300), 0x8)
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
getpgid(0xffffffffffffffff)
getpgrp(0x0)
gettid()
syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f736f636b2314bf7d8b73")
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000800)=ANY=[], 0x0)
setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@broadcast, @dev}, 0xc)
seccomp(0x0, 0x0, &(0x7f0000000100))
lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640))

03:42:12 executing program 4:
io_setup(0x4000000005, &(0x7f0000000080))
socket$inet_tcp(0x2, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]})
write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f00000002c0)={0x20}, 0x20)
syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f")
openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0), &(0x7f0000000400)=0x8)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000440), 0x8)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480), &(0x7f00000004c0)=0x8)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000780))
clone(0x0, &(0x7f0000000500), &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680))
mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000340), 0x8)
syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0)

03:42:12 executing program 0:
capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24)

[ 2492.381874] audit: type=1400 audit(2000000532.750:3287): avc:  denied  { map } for  pid=27819 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:12 executing program 1:
perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timerfd_create(0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
dup2(0xffffffffffffff9c, 0xffffffffffffffff)
getpid()
getpgid(0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
fstat(0xffffffffffffffff, &(0x7f0000000480))
getgid()
stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500))
fstat(0xffffffffffffffff, &(0x7f0000000580))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8)
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce)
fstat(0xffffffffffffffff, &(0x7f0000000940))
lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getegid()
geteuid()
getgid()
getuid()
fstat(0xffffffffffffffff, &(0x7f00000021c0))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000002240))
lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300))

[ 2492.535843] audit: type=1400 audit(2000000532.900:3288): avc:  denied  { map } for  pid=27825 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:13 executing program 5:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1bacf914c1bafb2, &(0x7f0000000300)=[{}]})
ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f0000000000)=""/174)

03:42:13 executing program 2:
signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0))
eventfd2(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[])
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194)
signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0))
getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680))
getgid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00))
getgid()
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000b40))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getpgrp(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00))
lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80))
lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8)
lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc)
stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0))
getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc)
lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc)
getpid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8)
getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:13 executing program 4:
prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00')
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0)
pipe(&(0x7f0000000580))
getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380})
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9)
keyctl$revoke(0x3, 0x0)
clock_gettime(0x0, &(0x7f00000003c0))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7)
munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000)
mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}})
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
msgget(0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8)
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00))
getpid()
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40))
munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4)

[ 2493.319627] audit: type=1400 audit(2000000533.690:3289): avc:  denied  { map } for  pid=27839 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:13 executing program 0:
capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8))
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x24)

03:42:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timerfd_create(0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
dup2(0xffffffffffffff9c, 0xffffffffffffffff)
getpid()
getpgid(0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
fstat(0xffffffffffffffff, &(0x7f0000000480))
getgid()
stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500))
fstat(0xffffffffffffffff, &(0x7f0000000580))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8)
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce)
fstat(0xffffffffffffffff, &(0x7f0000000940))
lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getegid()
geteuid()
getgid()
getuid()
fstat(0xffffffffffffffff, &(0x7f00000021c0))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000002240))
lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300))

03:42:14 executing program 4:
prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00')
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0)
pipe(&(0x7f0000000580))
getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380})
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9)
keyctl$revoke(0x3, 0x0)
clock_gettime(0x0, &(0x7f00000003c0))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7)
munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000)
mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}})
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
msgget(0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8)
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00))
getpid()
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40))
munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4)

03:42:14 executing program 1:
perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timerfd_create(0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
dup2(0xffffffffffffff9c, 0xffffffffffffffff)
getpid()
getpgid(0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
fstat(0xffffffffffffffff, &(0x7f0000000480))
getgid()
stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500))
fstat(0xffffffffffffffff, &(0x7f0000000580))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8)
getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0x1000001ce)
fstat(0xffffffffffffffff, &(0x7f0000000940))
lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getegid()
geteuid()
getgid()
getuid()
fstat(0xffffffffffffffff, &(0x7f00000021c0))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000002240))
lstat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300))

03:42:15 executing program 4:
prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00')
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0)
pipe(&(0x7f0000000580))
getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380})
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9)
keyctl$revoke(0x3, 0x0)
clock_gettime(0x0, &(0x7f00000003c0))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7)
munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000)
mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}})
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
msgget(0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8)
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00))
getpid()
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40))
munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4)

03:42:15 executing program 1:
futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0)
clock_getres(0x0, &(0x7f0000000280))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc)
syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941")
syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00')

03:42:15 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
ioctl(r1, 0x4000008907, &(0x7f00000001c0))
sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0)
recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0)

03:42:15 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0)

03:42:15 executing program 3:
prctl$intptr(0x1f, 0x0)
syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00')
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:16 executing program 2:
signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0))
eventfd2(0x0, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[])
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194)
signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0))
getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680))
getgid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00))
getgid()
getpid()
fstat(0xffffffffffffffff, &(0x7f0000000b40))
stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00))
getpgrp(0xffffffffffffffff)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00))
lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80))
lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8)
lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc)
stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0))
getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc)
stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc)
lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc)
getpid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8)
getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:16 executing program 4:
prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00')
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0)
pipe(&(0x7f0000000580))
getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380})
sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0)
add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0xfffffffffffffff9)
keyctl$revoke(0x3, 0x0)
clock_gettime(0x0, &(0x7f00000003c0))
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7)
munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000)
mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000240)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}})
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
msgget(0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8)
getgroups(0x0, &(0x7f0000000440))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000009c0)=0xc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00))
getpid()
msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000a40))
munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000)
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4)

[ 2496.049920] kauditd_printk_skb: 12 callbacks suppressed
[ 2496.049934] audit: type=1400 audit(2000000536.420:3302): avc:  denied  { map } for  pid=27886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2496.091356] audit: type=1400 audit(2000000536.460:3303): avc:  denied  { prog_load } for  pid=27889 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:42:16 executing program 1:
futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0)
clock_getres(0x0, &(0x7f0000000280))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc)
syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941")
syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00')

[ 2496.220660] audit: type=1400 audit(2000000536.590:3304): avc:  denied  { map } for  pid=27896 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:17 executing program 4:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'teql0\x00', 0x102})
ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0))

03:42:17 executing program 4:
signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8)
dup(0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'})
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00')
openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc)
getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80))
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}})
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600))
getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
socket(0x0, 0x0, 0x0)
signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000540))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240))
syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

[ 2496.994713] audit: type=1400 audit(2000000537.360:3305): avc:  denied  { create } for  pid=27919 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0
03:42:17 executing program 1:
futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0)
clock_getres(0x0, &(0x7f0000000280))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc)
syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941")
syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00')

[ 2497.162182] audit: type=1400 audit(2000000537.390:3306): avc:  denied  { map } for  pid=27922 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2497.190204] audit: type=1400 audit(2000000537.390:3307): avc:  denied  { map } for  pid=27923 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2497.213829] audit: type=1400 audit(2000000537.530:3308): avc:  denied  { map } for  pid=27924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:17 executing program 1:
futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x0)
clock_getres(0x0, &(0x7f0000000280))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socket$inet_icmp_raw(0x2, 0x3, 0x1)
openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f00000007c0)=0xc)
syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00088020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f08e9fc421f97087b90000000f7fb3dffbc941")
syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00')

03:42:17 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0)

[ 2497.315285] audit: type=1400 audit(2000000537.680:3309): avc:  denied  { map } for  pid=27931 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2497.841293] audit: type=1400 audit(2000000538.210:3310): avc:  denied  { create } for  pid=27919 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0
[ 2497.867627] audit: type=1400 audit(2000000538.240:3311): avc:  denied  { map } for  pid=27938 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:18 executing program 4:
signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8)
dup(0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'})
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00')
openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc)
getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80))
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}})
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600))
getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
socket(0x0, 0x0, 0x0)
signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000540))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240))
syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:42:18 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
ioctl(r1, 0x4000008907, &(0x7f00000001c0))
sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0)
recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0)

03:42:18 executing program 1:
getpid()
perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)="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", 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10)
setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140))
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280))
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0)
getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4)
inotify_rm_watch(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700))
fstat(0xffffffffffffffff, &(0x7f0000000740))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0))
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc)
lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001d40))
getpgid(0xffffffffffffffff)
getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8)
getgroups(0x0, &(0x7f0000002080))
getpgrp(0xffffffffffffffff)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480))
geteuid()
fstat(0xffffffffffffffff, &(0x7f00000034c0))
gettid()
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000003540))
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8)
lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8)
getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00))
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080))

03:42:18 executing program 3:
mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00')
keyctl$session_to_parent(0x12)
fstat(0xffffffffffffff9c, &(0x7f0000000380))
getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480))
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:18 executing program 2:
syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040)
seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0)
gettid()
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8)
syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6")
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20)
setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300))
userfaultfd(0x0)
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18)
ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380))
seccomp(0x0, 0x0, &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0))
creat(&(0x7f0000000540)='./file0\x00', 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0)
syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037")

03:42:18 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0)

03:42:19 executing program 4:
signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8)
dup(0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'})
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00')
openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc)
getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80))
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}})
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600))
getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
socket(0x0, 0x0, 0x0)
signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000540))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240))
syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:42:19 executing program 1:
getpid()
perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)="0000000000000080eb4142e1b2a20962446db1566dd695ea63970131417c4180fc0a3017cf0081a83f46e4ae83c245ec41b7658054990ea91d3e269df60e8b297394c990cdd539f04c86aa085c816fa7f4c7acc1c6226625260e5753d3c8a4d5d30e1c63730399854b03250e0c58582035ede1592017734cde8207bb15582e5bd5aa676964f698bb0e7768a3ef0ff17fd64ef61f45de2ab31674f6f118023079aa75ef579ab56b4b000917dca887e3dfb747af84e02a20225178296f07a0d4cd4b1f1720c5cb924aa0eb64950cdb0d2a7b80621cdc32e89b9e46b1f26463935b47a4f8e32e52521c05264d6102f8402f63b74324362e6efb15fd6ace84d834", 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10)
setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140))
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280))
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0)
getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4)
inotify_rm_watch(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700))
fstat(0xffffffffffffffff, &(0x7f0000000740))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0))
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc)
lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001d40))
getpgid(0xffffffffffffffff)
getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8)
getgroups(0x0, &(0x7f0000002080))
getpgrp(0xffffffffffffffff)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480))
geteuid()
fstat(0xffffffffffffffff, &(0x7f00000034c0))
gettid()
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000003540))
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8)
lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8)
getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00))
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080))

03:42:20 executing program 4:
signalfd(0xffffffffffffff9c, &(0x7f00000007c0), 0x8)
dup(0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'})
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080))
syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/user\x00')
openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040))
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4}}, 0x5c)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[]}}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc)
getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80))
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ppp\x00', 0x0, 0x0)
socket$nl_netfilter(0x10, 0x3, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f80)='pids.current\x00', 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @rand_addr, @broadcast}, &(0x7f0000000680)=0xc)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000006c0)={@mcast1, @loopback, @ipv4={[], [], @local}})
ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000600))
getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000001740)=ANY=[]}}, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
socket(0x0, 0x0, 0x0)
signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8)
socketpair(0x0, 0x0, 0x0, &(0x7f0000000540))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240))
syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00')
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:42:20 executing program 3:
mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00')
keyctl$session_to_parent(0x12)
fstat(0xffffffffffffff9c, &(0x7f0000000380))
getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480))
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:20 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000), 0x0)

03:42:20 executing program 1:
getpid()
perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)="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", 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10)
setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140))
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280))
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0)
getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4)
inotify_rm_watch(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700))
fstat(0xffffffffffffffff, &(0x7f0000000740))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0))
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc)
lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001d40))
getpgid(0xffffffffffffffff)
getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8)
getgroups(0x0, &(0x7f0000002080))
getpgrp(0xffffffffffffffff)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480))
geteuid()
fstat(0xffffffffffffffff, &(0x7f00000034c0))
gettid()
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000003540))
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8)
lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8)
getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00))
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080))

03:42:20 executing program 2:
syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040)
seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0)
gettid()
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8)
syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6")
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20)
setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300))
userfaultfd(0x0)
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18)
ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380))
seccomp(0x0, 0x0, &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0))
creat(&(0x7f0000000540)='./file0\x00', 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0)
syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037")

03:42:21 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
ioctl(r1, 0x4000008907, &(0x7f00000001c0))
sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0)
recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0)

03:42:21 executing program 4:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = dup(r0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff)
r2 = getpid()
sched_setscheduler(r2, 0x5, &(0x7f0000000200))
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080), &(0x7f0000000140)=0x8)

03:42:21 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0)
clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000140))
ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a})

03:42:21 executing program 3:
mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00')
keyctl$session_to_parent(0x12)
fstat(0xffffffffffffff9c, &(0x7f0000000380))
getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480))
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:21 executing program 4:
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd)
rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080))

03:42:21 executing program 4:
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd)
rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080))

03:42:21 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0)
clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000140))
ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a})

03:42:21 executing program 4:
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd)
rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080))

03:42:21 executing program 4:
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x1, 0x4)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xd)
rt_sigaction(0x10, &(0x7f0000000040), 0x0, 0x8, &(0x7f0000000080))

03:42:21 executing program 4:
prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:21 executing program 1:
getpid()
perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
memfd_create(&(0x7f0000000140)="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", 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d)
accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10)
setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140))
epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280))
inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0)
getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4)
inotify_rm_watch(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700))
fstat(0xffffffffffffffff, &(0x7f0000000740))
fstat(0xffffffffffffffff, &(0x7f00000007c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0))
fstat(0xffffffffffffffff, &(0x7f0000000b00))
getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc)
lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00))
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000001d40))
getpgid(0xffffffffffffffff)
getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8)
getgroups(0x0, &(0x7f0000002080))
getpgrp(0xffffffffffffffff)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480))
geteuid()
fstat(0xffffffffffffffff, &(0x7f00000034c0))
gettid()
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000003540))
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000035c0)={0xffffffffffffffff}, 0xc)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8)
lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8)
getresgid(&(0x7f0000003d80), &(0x7f0000003dc0), &(0x7f0000003e00))
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080))

[ 2501.171956] kauditd_printk_skb: 30 callbacks suppressed
[ 2501.171970] audit: type=1400 audit(2000000541.540:3342): avc:  denied  { map } for  pid=28037 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2501.237977] audit: type=1400 audit(2000000541.580:3343): avc:  denied  { map } for  pid=28040 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:22 executing program 2:
syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040)
seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0)
gettid()
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8)
syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6")
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20)
setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300))
userfaultfd(0x0)
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18)
ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380))
seccomp(0x0, 0x0, &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0))
creat(&(0x7f0000000540)='./file0\x00', 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0)
syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037")

[ 2502.002591] audit: type=1400 audit(2000000542.370:3344): avc:  denied  { map } for  pid=28047 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2502.064624] audit: type=1400 audit(2000000542.430:3345): avc:  denied  { map } for  pid=28048 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2502.111887] audit: type=1400 audit(2000000542.480:3346): avc:  denied  { map } for  pid=28049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2502.142892] audit: type=1400 audit(2000000542.510:3347): avc:  denied  { create } for  pid=28050 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:22 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
ioctl(r1, 0x4000008907, &(0x7f00000001c0))
sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0)
recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0)

03:42:22 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0)
clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000140))
ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a})

03:42:22 executing program 4:
prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:22 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0)
write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCXONC(r1, 0x540a, 0x3)

03:42:22 executing program 3:
mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00')
keyctl$session_to_parent(0x12)
fstat(0xffffffffffffff9c, &(0x7f0000000380))
getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480))
lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:22 executing program 5:
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0)
clone(0x4002102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000140))
ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000040)={0xb000040, 0x40000000000000a})

[ 2502.234682] audit: type=1400 audit(2000000542.600:3348): avc:  denied  { map } for  pid=28052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:22 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0)
write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCXONC(r1, 0x540a, 0x3)

[ 2502.327375] audit: type=1400 audit(2000000542.690:3349): avc:  denied  { map } for  pid=28061 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:22 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0)
write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCXONC(r1, 0x540a, 0x3)

[ 2502.370667] audit: type=1400 audit(2000000542.700:3350): avc:  denied  { map } for  pid=28062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2502.415611] audit: type=1400 audit(2000000542.780:3351): avc:  denied  { map } for  pid=28065 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:22 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0)
write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000063fc900000000000000050000008c0100000400000000000000000065750ede825e45a90f3d09876e6d0cd4e191a1f98937702d8f9523b12ed909205c7333bb937dee28d4b2921ea4c8fa86a91c8275dd4b26916a0dc38b518cdf628235cebb98b7559414d05501b53517cdf5426294335b7189c3003b2cbdae69c72000000000000000710e13"], 0x89)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
ioctl$TCXONC(r1, 0x540a, 0x3)

03:42:22 executing program 5:
clock_gettime(0x0, &(0x7f00000002c0))
setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580))
openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0)
geteuid()
request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8)
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0)
keyctl$negate(0xd, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000005c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc)
getgid()
gettid()
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096)
syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00')
accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14)
getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14)
accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc)
getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e")

03:42:23 executing program 1:
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

03:42:23 executing program 1:
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

03:42:23 executing program 4:
prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:23 executing program 2:
syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040)
seccomp(0x0, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000400)})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00')
sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0)
gettid()
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180))
setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8)
syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6")
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20)
setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300))
userfaultfd(0x0)
write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18)
ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380))
seccomp(0x0, 0x0, &(0x7f0000000100))
seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0))
creat(&(0x7f0000000540)='./file0\x00', 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'})
recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000036c0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003900)={{{@in6, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000003a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000a040), 0x0, 0x0, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000a180)={0x0, @multicast1}, &(0x7f000000a1c0)=0xc)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'dummy0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a8c0)={{{@in, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f000000a9c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@empty, @loopback}, &(0x7f000000aa40)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aac0)={@empty, @multicast2}, &(0x7f000000ab00)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000ab40)={'vcan0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ad40)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'tunl0\x00'})
getsockname$packet(0xffffffffffffffff, &(0x7f000000ae40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae80)=0x14)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000aec0)={'yam0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000af00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f000000b000)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b040)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b080)={'team0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f000000b0c0), &(0x7f000000b100)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f000000b140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b180)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b1c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f000000b2c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000bc80)={&(0x7f0000000800), 0xc, &(0x7f000000bc40)={&(0x7f000000b300)={0x14}, 0x14}}, 0x0)
syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037")

03:42:23 executing program 1:
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

03:42:23 executing program 5:
clock_gettime(0x0, &(0x7f00000002c0))
setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580))
openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0)
geteuid()
request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8)
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0)
keyctl$negate(0xd, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000005c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc)
getgid()
gettid()
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096)
syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00')
accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14)
getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14)
accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc)
getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e")

03:42:23 executing program 0:
r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000))
accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10, 0x0)
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127})
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[])
r1 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f00000006c0)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185})
ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x4000000)

03:42:23 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c48875e05b18a4cb3a9cd12dcea440d899c22cebd3b6abf62d996addb07aa3cde470652b3a471b4a7fa2f3fdf6e034d8000000004b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0)
write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[], 0xffffff19)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x6611, &(0x7f0000000040))

03:42:23 executing program 1:
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0x6cf1}, &(0x7f0000000040)=0x98)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000040), 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

03:42:24 executing program 1:
openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0)
accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80)
recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14)
keyctl$set_reqkey_keyring(0x5, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getpgid(0x0)
add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:24 executing program 4:
prctl$seccomp(0xf, 0x400000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:25 executing program 1:
openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0)
accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80)
recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14)
keyctl$set_reqkey_keyring(0x5, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getpgid(0x0)
add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:25 executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x9}, 0x14)
bpf$MAP_CREATE(0x0, &(0x7f000061e000)={0xd, 0x2, 0x4, 0x69, 0x0, r0}, 0x2c)

03:42:25 executing program 4:
munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000)
add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9)
geteuid()
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10)
fstat(0xffffffffffffffff, &(0x7f00000002c0))
keyctl$chown(0x4, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}})
fchdir(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500))
syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:25 executing program 5:
clock_gettime(0x0, &(0x7f00000002c0))
setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580))
openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0)
geteuid()
request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8)
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0)
keyctl$negate(0xd, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000005c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc)
getgid()
gettid()
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096)
syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00')
accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14)
getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14)
accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc)
getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e")

03:42:26 executing program 1:
openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0)
accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80)
recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14)
keyctl$set_reqkey_keyring(0x5, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getpgid(0x0)
add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:26 executing program 3:
clock_gettime(0x4, &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socket$inet_tcp(0x2, 0x1, 0x0)
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000380)=0x54)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xfffffffffffffe4c)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@remote}, 0x14)
lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0))
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0))
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff)
getpid()
syz_open_procfs(0x0, &(0x7f0000000140)='attr/current\x00')
sched_setscheduler(0x0, 0x0, &(0x7f0000000200))
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000), 0x4)
syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
getxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/191, 0xbf)
openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0)
fcntl$getflags(0xffffffffffffffff, 0x0)
fcntl$getown(0xffffffffffffff9c, 0x9)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc)
lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800))
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000880))
ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000400)={0x0, &(0x7f00000003c0)})

03:42:26 executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x41300}, 0x48)

03:42:26 executing program 2:
getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0))
syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80))
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:26 executing program 4:
munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000)
add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9)
geteuid()
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10)
fstat(0xffffffffffffffff, &(0x7f00000002c0))
keyctl$chown(0x4, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}})
fchdir(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500))
syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:27 executing program 1:
openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x101040, 0x0)
accept(0xffffffffffffff9c, &(0x7f00000005c0)=@xdp, &(0x7f0000000640)=0x80)
recvfrom$packet(0xffffffffffffffff, &(0x7f0000000580)=""/59, 0x3b, 0x0, &(0x7f0000000680), 0x14)
keyctl$set_reqkey_keyring(0x5, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getpgid(0x0)
add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000440)="428055a0726969ef69dc00d99069203737c33941ded9060f38211a40a56c0f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

[ 2506.785303] kauditd_printk_skb: 26 callbacks suppressed
[ 2506.785318] audit: type=1400 audit(2000000547.150:3378): avc:  denied  { prog_load } for  pid=28148 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
[ 2506.850793] audit: type=1400 audit(2000000547.160:3379): avc:  denied  { prog_load } for  pid=28148 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:42:27 executing program 4:
munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000)
add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9)
geteuid()
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10)
fstat(0xffffffffffffffff, &(0x7f00000002c0))
keyctl$chown(0x4, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}})
fchdir(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500))
syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

[ 2506.897858] audit: type=1400 audit(2000000547.200:3380): avc:  denied  { map } for  pid=28152 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:27 executing program 0:
add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0)
keyctl$clear(0x7, 0x0)
prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself')
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
dup(0xffffffffffffffff)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041")

[ 2507.004848] audit: type=1400 audit(2000000547.370:3381): avc:  denied  { map } for  pid=28159 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:27 executing program 5:
clock_gettime(0x0, &(0x7f00000002c0))
setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580))
openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0)
geteuid()
request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8)
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0)
keyctl$negate(0xd, 0x0, 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000005c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc)
getgid()
gettid()
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8)
getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096)
syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00')
accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14)
getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14)
accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc)
getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8)
getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e")

[ 2507.226918] audit: type=1400 audit(2000000547.590:3382): avc:  denied  { map } for  pid=28163 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:28 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x1008)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5)
sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c)
close(r0)

[ 2507.696262] audit: type=1400 audit(2000000548.060:3383): avc:  denied  { map } for  pid=28166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:28 executing program 4:
munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000)
add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9)
geteuid()
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10)
fstat(0xffffffffffffffff, &(0x7f00000002c0))
keyctl$chown(0x4, 0x0, 0x0, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
sendto(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000680)=@generic={0x0, "4733045446a33b2c6fe7a400d206fd12d80478b0090c643f2aff755143e36472bfa17c43e352a27b817797324966c4e2d8a6c4f4e9c2597a5d3dc4de73e45605f0d90a99546240ecb50525b1db71f258844a6481ff3caa9846805739692e9fe0bee0170f84b5350059f6e5e892958099c802f082f17ad5192b5f6af06c51"}, 0x80)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}})
fchdir(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]})
setitimer(0x0, &(0x7f0000000480)={{0x0, 0x2710}}, &(0x7f0000000500))
syz_execute_func(&(0x7f0000000bc0)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:28 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x1008)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5)
sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c)
close(r0)

[ 2507.816604] audit: type=1400 audit(2000000548.180:3384): avc:  denied  { map } for  pid=28174 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2507.872550] audit: type=1400 audit(2000000548.240:3385): avc:  denied  { create } for  pid=28169 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:28 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x1008)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5)
sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c)
close(r0)

[ 2507.978948] audit: type=1400 audit(2000000548.350:3386): avc:  denied  { map } for  pid=28181 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2508.009119] audit: type=1400 audit(2000000548.380:3387): avc:  denied  { create } for  pid=28165 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:42:29 executing program 3:
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}})
prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil)
signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
rt_sigreturn()
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e)
socket$nl_route(0x10, 0x3, 0x0)
getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580))
lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc)
stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40))
fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180))
geteuid()
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0)
ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940))
syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f")

03:42:29 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10)
setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x1008)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5)
sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c)
close(r0)

03:42:29 executing program 2:
getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0))
syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80))
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:29 executing program 4:
pipe2$9p(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}})
write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a)
write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16)
write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb)
write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}})
creat(&(0x7f0000000900)='./file0/file0\x00', 0x0)

03:42:29 executing program 4:
pipe2$9p(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}})
write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a)
write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16)
write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb)
write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}})
creat(&(0x7f0000000900)='./file0/file0\x00', 0x0)

03:42:29 executing program 1:
pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:29 executing program 0:
add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0)
keyctl$clear(0x7, 0x0)
prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself')
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
dup(0xffffffffffffffff)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041")

03:42:29 executing program 4:
pipe2$9p(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}})
write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a)
write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16)
write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb)
write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}})
creat(&(0x7f0000000900)='./file0/file0\x00', 0x0)

03:42:29 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c)
listen(r0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1)

03:42:29 executing program 4:
pipe2$9p(&(0x7f0000000100)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r1, &(0x7f0000000600)={0x1509733a}, 0x7)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}})
write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a)
write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16)
write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWRITE(r1, &(0x7f0000000180)={0xb, 0x77, 0x1}, 0xb)
write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0)
write$P9_RWALK(r1, &(0x7f0000000940)={0x9, 0x6f, 0x1}, 0x9)
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}})
creat(&(0x7f0000000900)='./file0/file0\x00', 0x0)

03:42:29 executing program 4:
clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500))
set_tid_address(&(0x7f00000001c0))
socket$inet_icmp_raw(0x2, 0x3, 0x1)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)})
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpgrp(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040))
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0))
socket$inet6(0xa, 0x0, 0x0)
lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0)
getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0))
syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00')
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0)
setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480))
clock_adjtime(0x0, &(0x7f0000000240))

03:42:29 executing program 3:
keyctl$set_reqkey_keyring(0x5, 0xfffffffd)
socket$nl_route(0x10, 0x3, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")

03:42:30 executing program 1:
pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:30 executing program 4:
clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500))
set_tid_address(&(0x7f00000001c0))
socket$inet_icmp_raw(0x2, 0x3, 0x1)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)})
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpgrp(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040))
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0))
socket$inet6(0xa, 0x0, 0x0)
lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0)
getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0))
syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00')
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0)
setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480))
clock_adjtime(0x0, &(0x7f0000000240))

03:42:31 executing program 2:
getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0))
syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80))
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:31 executing program 1:
pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:31 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c)
listen(r0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1)

03:42:31 executing program 4:
clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500))
set_tid_address(&(0x7f00000001c0))
socket$inet_icmp_raw(0x2, 0x3, 0x1)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)})
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpgrp(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040))
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0))
socket$inet6(0xa, 0x0, 0x0)
lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0)
getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0))
syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00')
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0)
setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480))
clock_adjtime(0x0, &(0x7f0000000240))

03:42:32 executing program 0:
add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0)
keyctl$clear(0x7, 0x0)
prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself')
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
dup(0xffffffffffffffff)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041")

03:42:32 executing program 3:
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000200))
getcwd(&(0x7f0000000000)=""/42, 0x2a)
openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0)

03:42:32 executing program 1:
pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00')
socket$inet6_tcp(0xa, 0x1, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:42:32 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c)
listen(r0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1)

03:42:32 executing program 4:
clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500))
set_tid_address(&(0x7f00000001c0))
socket$inet_icmp_raw(0x2, 0x3, 0x1)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000780)={0x0, &(0x7f0000000740)})
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpgrp(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040))
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0))
socket$inet6(0xa, 0x0, 0x0)
lookup_dcookie(0x0, &(0x7f00000005c0)=""/160, 0xa0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='io.stat\x00', 0x0, 0x0)
getresuid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f00000003c0))
syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00')
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000800), 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x14}, 0x14}}, 0x0)
setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000140), 0x2)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[]}}, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0xd5c853c1e2a8761a)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0), 0xc)
socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000480))
clock_adjtime(0x0, &(0x7f0000000240))

[ 2512.459285] kauditd_printk_skb: 39 callbacks suppressed
[ 2512.459300] audit: type=1400 audit(2000000552.830:3427): avc:  denied  { map } for  pid=28278 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2512.515632] audit: type=1400 audit(2000000552.860:3428): avc:  denied  { map } for  pid=28279 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2512.563276] audit: type=1400 audit(2000000552.860:3429): avc:  denied  { create } for  pid=28273 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2512.614098] audit: type=1400 audit(2000000552.860:3430): avc:  denied  { create } for  pid=28273 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2512.639002] audit: type=1400 audit(2000000552.870:3431): avc:  denied  { map } for  pid=28280 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2512.662193] audit: type=1400 audit(2000000552.880:3432): avc:  denied  { map } for  pid=28281 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2512.830961] audit: type=1400 audit(2000000553.200:3433): avc:  denied  { map } for  pid=28282 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:33 executing program 1:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161180000000000616200000000000085100000010000009500000000000000bf100000000000006d200000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0x50, &(0x7f0000000080)}, 0x10)

03:42:33 executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="85105ae6b95583a2"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48)

03:42:33 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$inet6_dccp(0xa, 0x6, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

[ 2513.223589] audit: type=1400 audit(2000000553.590:3434): avc:  denied  { map } for  pid=28290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2513.253172] audit: type=1400 audit(2000000553.620:3435): avc:  denied  { prog_load } for  pid=28291 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:42:33 executing program 2:
getresuid(&(0x7f0000000900), &(0x7f0000000240), &(0x7f00000000c0))
syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000700)=ANY=[], &(0x7f0000000a80))
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f0000000d00)=0x8)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f")

03:42:33 executing program 1:
epoll_create(0x1)
accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0))
syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0)
pipe2$9p(&(0x7f0000000440), 0x0)
syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000640))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80))
openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97)
getgroups(0x0, &(0x7f00000002c0))
getpid()
getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40))
gettid()
geteuid()
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280))
getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340))
getgid()
getpgrp(0x0)
geteuid()
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:33 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0)
r1 = dup2(r0, r0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffd, 'queue0\x00'})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
dup2(r2, r1)

03:42:33 executing program 4:
prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
sync()
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140))
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040))
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'})
socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f")

[ 2513.318303] audit: type=1400 audit(2000000553.620:3436): avc:  denied  { prog_load } for  pid=28293 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:42:34 executing program 0:
add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0)
keyctl$clear(0x7, 0x0)
prctl$setname(0x59616d61, &(0x7f0000000040)='bdevselfcgroupself')
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4)
ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000200))
openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0)
write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
dup(0xffffffffffffffff)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041")

03:42:34 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c)
listen(r0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x8000000004)
writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1)

03:42:34 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040))
sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0))
syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0)
write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf)
link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00')
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0)
openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
io_setup(0x0, &(0x7f0000000140))
bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8)
setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8)
creat(&(0x7f00000002c0)='./file0\x00', 0x0)
creat(&(0x7f0000000540)='./file0\x00', 0x0)
getpgid(0x0)
sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480))
openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8)
creat(&(0x7f0000000640)='./file1/file0\x00', 0x0)
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:34 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$inet6_dccp(0xa, 0x6, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

03:42:34 executing program 1:
epoll_create(0x1)
accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0))
syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0)
pipe2$9p(&(0x7f0000000440), 0x0)
syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000640))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80))
openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97)
getgroups(0x0, &(0x7f00000002c0))
getpid()
getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40))
gettid()
geteuid()
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280))
getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340))
getgid()
getpgrp(0x0)
geteuid()
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:35 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e")
openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0)
ioctl$void(0xffffffffffffffff, 0x0)
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
sysfs$3(0x3)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340))
openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})

03:42:35 executing program 2:
r0 = socket$inet6(0xa, 0x800000806, 0x0)
setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="0022040009ffffebffffff1ce7b306feffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae6d1ed41101010000000000ed7449b842f3941868b93396edd653be8ad8c8e286e509ba01a937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6a", 0x118)

03:42:35 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="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", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:35 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$inet6_dccp(0xa, 0x6, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

03:42:35 executing program 1:
epoll_create(0x1)
accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0))
syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0)
pipe2$9p(&(0x7f0000000440), 0x0)
syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000640))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80))
openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97)
getgroups(0x0, &(0x7f00000002c0))
getpid()
getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40))
gettid()
geteuid()
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280))
getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340))
getgid()
getpgrp(0x0)
geteuid()
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:35 executing program 2:
r0 = socket$inet6(0xa, 0x800000806, 0x0)
setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118)

03:42:36 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e")
openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0)
ioctl$void(0xffffffffffffffff, 0x0)
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
sysfs$3(0x3)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340))
openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})

03:42:36 executing program 1:
epoll_create(0x1)
accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0))
syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0)
pipe2$9p(&(0x7f0000000440), 0x0)
syz_open_dev$ndb(&(0x7f0000000480)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
socket$inet6_udplite(0xa, 0x2, 0x88)
openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c)
setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000840)=0x74)
getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getgroups(0x0, &(0x7f0000000a00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40))
fstat(0xffffffffffffffff, &(0x7f0000000640))
getgid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
getresgid(&(0x7f0000000240), &(0x7f0000000c00), &(0x7f00000001c0))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80))
openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97)
getgroups(0x0, &(0x7f00000002c0))
getpid()
getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0))
lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40))
gettid()
geteuid()
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280))
getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340))
getgid()
getpgrp(0x0)
geteuid()
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:42:36 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
socket$inet6_dccp(0xa, 0x6, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

03:42:36 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, <r2=>0x0})
ptrace$setopts(0x4206, r2, 0x0, 0x0)
ptrace(0x4207, r2)
ptrace$setopts(0x420b, r2, 0x8, 0x907000)

03:42:37 executing program 2:
r0 = socket$inet6(0xa, 0x800000806, 0x0)
setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118)

03:42:37 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e")
openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0)
ioctl$void(0xffffffffffffffff, 0x0)
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
sysfs$3(0x3)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340))
openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})

03:42:37 executing program 1:
keyctl$set_reqkey_keyring(0x7, 0xfffffffe)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getgid()
getuid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8)

03:42:38 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f017cee66410fd7d58600d7c0c176cb66662626660f69b2000000003900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af555c4a1ff701c3f0469687119c4436948b83100000000c463e1798205000000007e")
openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0)
ioctl$void(0xffffffffffffffff, 0x0)
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
sysfs$3(0x3)
ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340))
openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)})

[ 2518.025588] kauditd_printk_skb: 25 callbacks suppressed
[ 2518.025603] audit: type=1400 audit(2000000558.390:3462): avc:  denied  { create } for  pid=28376 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2518.161386] audit: type=1400 audit(2000000558.530:3463): avc:  denied  { map } for  pid=28388 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2518.286914] audit: type=1400 audit(2000000558.650:3464): avc:  denied  { map } for  pid=28391 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2518.352917] audit: type=1400 audit(2000000558.720:3465): avc:  denied  { map } for  pid=28393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2518.394618] audit: type=1400 audit(2000000558.760:3466): avc:  denied  { map } for  pid=28394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:38 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:38 executing program 1:
keyctl$set_reqkey_keyring(0x7, 0xfffffffe)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getgid()
getuid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8)

03:42:38 executing program 3:
alarm(0x0)
umount2(&(0x7f0000000080)='./file0\x00', 0x0)
clock_gettime(0x0, &(0x7f0000000340))
keyctl$set_reqkey_keyring(0x5, 0x0)
futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
semget(0xffffffffffffffff, 0x0, 0x0)
stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080))
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=0xffffffffffffffff, 0x4)
close(0xffffffffffffffff)
pipe2(&(0x7f0000000680), 0x0)
setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0)
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
io_setup(0x0, &(0x7f0000000640))
openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000840)='wchan\x00')
eventfd2(0x0, 0x0)
dup(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000540)=""/153)
syz_execute_func(&(0x7f00000004c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f")

03:42:38 executing program 2:
r0 = socket$inet6(0xa, 0x800000806, 0x0)
setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="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", 0x118)

03:42:38 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, <r2=>0x0})
ptrace$setopts(0x4206, r2, 0x0, 0x0)
ptrace(0x4207, r2)
ptrace$setopts(0x420b, r2, 0x8, 0x907000)

[ 2518.581575] audit: type=1400 audit(2000000558.950:3467): avc:  denied  { map } for  pid=28397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:39 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:39 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, <r2=>0x0})
ptrace$setopts(0x4206, r2, 0x0, 0x0)
ptrace(0x4207, r2)
ptrace$setopts(0x420b, r2, 0x8, 0x907000)

03:42:39 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

[ 2519.189109] audit: type=1400 audit(2000000559.560:3468): avc:  denied  { map } for  pid=28414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2519.306573] audit: type=1400 audit(2000000559.670:3469): avc:  denied  { map } for  pid=28417 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:39 executing program 3:
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)})
request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8)
add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0)
memfd_create(&(0x7f00000001c0)='\x00', 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10)

03:42:39 executing program 1:
keyctl$set_reqkey_keyring(0x7, 0xfffffffe)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getgid()
getuid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8)

[ 2519.581661] audit: type=1400 audit(2000000559.950:3470): avc:  denied  { map } for  pid=28421 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2519.673348] audit: type=1400 audit(2000000560.040:3471): avc:  denied  { map } for  pid=28424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:40 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:40 executing program 1:
keyctl$set_reqkey_keyring(0x7, 0xfffffffe)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)
getgid()
getuid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8)

03:42:41 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:41 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, <r2=>0x0})
ptrace$setopts(0x4206, r2, 0x0, 0x0)
ptrace(0x4207, r2)
ptrace$setopts(0x420b, r2, 0x8, 0x907000)

03:42:41 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:41 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0)
syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0)

03:42:42 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0)
syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0)

03:42:42 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet(0x10, 0x100000002, 0x0)
sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:42 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0)
syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0)

03:42:42 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:42 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa30000, 0xa30000}, 0xffffffffffffffff}, 0x20, 0x0, 0x0)
syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x0)

03:42:42 executing program 3:
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)})
request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8)
add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0)
memfd_create(&(0x7f00000001c0)='\x00', 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10)

03:42:42 executing program 4:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:42 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

[ 2522.534322] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'.
[ 2522.555904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'.
[ 2523.187860] kauditd_printk_skb: 12 callbacks suppressed
[ 2523.187876] audit: type=1400 audit(2000000563.550:3484): avc:  denied  { map } for  pid=28489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2523.324249] syz-executor4 (28469) used greatest stack depth: 12600 bytes left
[ 2523.396417] audit: type=1400 audit(2000000563.760:3485): avc:  denied  { map } for  pid=28494 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:43 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="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", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:43 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet(0x10, 0x100000002, 0x0)
sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:43 executing program 3:
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)})
request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8)
add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0)
memfd_create(&(0x7f00000001c0)='\x00', 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10)

03:42:43 executing program 4:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:43 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

[ 2523.604176] audit: type=1400 audit(2000000563.970:3486): avc:  denied  { map } for  pid=28502 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2523.712301] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'.
03:42:44 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet(0x10, 0x100000002, 0x0)
sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:44 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

[ 2524.188990] audit: type=1400 audit(2000000564.550:3487): avc:  denied  { map } for  pid=28512 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2524.244058] audit: type=1400 audit(2000000564.610:3488): avc:  denied  { map } for  pid=28514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2524.605820] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'.
[ 2524.921671] audit: type=1400 audit(2000000565.290:3489): avc:  denied  { map } for  pid=28521 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2524.990500] audit: type=1400 audit(2000000565.360:3490): avc:  denied  { map } for  pid=28522 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:45 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup2(r0, r0)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000280)={'bcsh0\x00', {0x2, 0x4e22}})
getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={<r1=>0x0, 0x800}, &(0x7f0000000180)=0x8)
setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1, 0xf0d}, 0xfffffffffffffe01)
sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe)
r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000140)={0x9})
bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60)
write(r2, &(0x7f0000000400)="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", 0x200)
sendfile(r2, r3, 0x0, 0x10000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$inet6(0xa, 0xe, 0x8, &(0x7f0000000100))

03:42:45 executing program 4:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:45 executing program 3:
fcntl$setsig(0xffffffffffffffff, 0xa, 0x0)
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9)
ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)})
request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8)
add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0)
memfd_create(&(0x7f00000001c0)='\x00', 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10)

03:42:45 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet(0x10, 0x100000002, 0x0)
sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0)

03:42:45 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

[ 2525.138411] audit: type=1400 audit(2000000565.500:3491): avc:  denied  { map } for  pid=28525 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2525.232761] audit: type=1400 audit(2000000565.600:3492): avc:  denied  { map } for  pid=28532 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2525.274680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'.
[ 2525.751401] audit: type=1400 audit(2000000566.120:3493): avc:  denied  { map } for  pid=28542 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:46 executing program 4:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:46 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:46 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:46 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:46 executing program 5:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:47 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:47 executing program 4:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffb)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000200))
bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x22, 0x0, 0xffffffffffffff9c}, 0x2c)

03:42:47 executing program 2:
prctl$setptracer(0x59616d61, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:47 executing program 4:
keyctl$set_reqkey_keyring(0x1d, 0xfffffffa)
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4)
lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca)
syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:48 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:48 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:48 executing program 5:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:48 executing program 4:
keyctl$set_reqkey_keyring(0x1d, 0xfffffffa)
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4)
lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca)
syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:48 executing program 1:
getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
gettid()
syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000")
ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)})
syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8)
syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f")
lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10)

[ 2528.404381] kauditd_printk_skb: 10 callbacks suppressed
[ 2528.404396] audit: type=1400 audit(2000000568.770:3504): avc:  denied  { map } for  pid=28602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2528.439544] audit: type=1400 audit(2000000568.780:3505): avc:  denied  { map } for  pid=28601 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:49 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:49 executing program 4:
keyctl$set_reqkey_keyring(0x1d, 0xfffffffa)
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4)
lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca)
syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:49 executing program 1:
getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
gettid()
syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000")
ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)})
syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8)
syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f")
lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10)

[ 2529.289539] audit: type=1400 audit(2000000569.660:3506): avc:  denied  { map } for  pid=28616 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2529.351159] audit: type=1400 audit(2000000569.720:3507): avc:  denied  { map } for  pid=28618 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:50 executing program 4:
keyctl$set_reqkey_keyring(0x1d, 0xfffffffa)
seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4)
lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca)
syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:50 executing program 1:
getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
gettid()
syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000")
ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)})
syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8)
syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f")
lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10)

[ 2530.210902] audit: type=1400 audit(2000000570.580:3508): avc:  denied  { map } for  pid=28627 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2530.961441] audit: type=1400 audit(2000000571.330:3509): avc:  denied  { map } for  pid=28635 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:51 executing program 2:
prctl$setptracer(0x59616d61, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:51 executing program 4:
prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil)
gettid()
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140))
getpgrp(0x0)
accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10)
recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380})
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
dup(0xffffffffffffffff)
geteuid()
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000240))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300))
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0)
ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0))
getpgid(0x0)
wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340))
getpgrp(0x0)
socket(0x0, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30)

[ 2531.056472] audit: type=1400 audit(2000000571.420:3510): avc:  denied  { map } for  pid=28638 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2531.134666] audit: type=1400 audit(2000000571.500:3511): avc:  denied  { map } for  pid=28643 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:51 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:51 executing program 1:
getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
gettid()
syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f72656673001a3efc24a96b15fb40c2e7872880f542dd03f2ba29a847eb79f54f4e7f2f511e7c042903e5cdb75b940d59215cdb4fd234dd2dba399e3b2c95590000")
ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)})
syz_execute_func(&(0x7f0000000300)="428055a0636969ef69dc00d9c481f8ae5c156669203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0)
seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000400))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='trusted.overlay.upper\x00'}, 0x10)
setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000500), 0x8)
syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f")
lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[], 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10)

[ 2531.169806] audit: type=1400 audit(2000000571.540:3512): avc:  denied  { map } for  pid=28644 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2531.209592] audit: type=1400 audit(2000000571.580:3513): avc:  denied  { map } for  pid=28647 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:52 executing program 5:
openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0)
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000140)=ANY=[])
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x200000005, 0x0)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c)
r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0)
ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000140)=""/186)
ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=<r3=>0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x8, 0x4, 0x0, 0x5, 0x0, 0x3, 0x40, 0x0, 0x0, 0xff, 0x0, 0x6, 0x0, 0x4, 0x1, 0x7, 0xcc2, 0x0, 0x3214, 0x0, 0x5, 0x3f, 0x26, 0x6, 0x3, 0x8, 0x9, 0x9, 0x5de, 0x1, 0x7, 0x29, 0xffff, 0x3, 0x800, 0x5, 0x0, 0x80000001, 0x1, @perf_config_ext={0x7, 0x4}, 0x12a23, 0x971b, 0x2, 0x0, 0x550, 0x9, 0x8}, r3, 0x6, r0, 0x2)
ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000740)=0x3)
sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20}, {0xa, 0x0, 0x7ff, @mcast2, 0x31}, 0x8, [0xfff, 0x5, 0x100000001, 0x5, 0x9021, 0x0, 0x3, 0x4]}, 0x5c)
ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000800)=0x80)
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000780)={0xab92, 0x80, 0x3, 0x5, 0x2, 0x3ff})
sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x9)
openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9008804}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="010029bd7000fedbdf250500e008080006000000000008ed0300e7dc2687140001000800060000080000b463a1e1080000000800070401001100"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0)

03:42:52 executing program 4:
prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil)
gettid()
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140))
getpgrp(0x0)
accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10)
recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380})
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
dup(0xffffffffffffffff)
geteuid()
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000240))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300))
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0)
ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0))
getpgid(0x0)
wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340))
getpgrp(0x0)
socket(0x0, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30)

03:42:52 executing program 1:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0xfffffffffffffe4d)
signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0)
socket$netlink(0x10, 0x3, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0x3bf)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'})
recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680})
getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80)
socket(0x0, 0x0, 0x0)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), 0x4)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc)
dup(0xffffffffffffffff)
ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000240), &(0x7f00000002c0)=""/168, 0x0, 0x0, 0x0, &(0x7f0000000380)})
ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1)
setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), 0x4)
seccomp(0x0, 0x0, &(0x7f0000000100))
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000007c0)}, 0x10)
openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]})
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0)
syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")
getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c)
setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000680), 0x4)

03:42:52 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df")
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}})
r1 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_getrule={0x20, 0x22, 0xb28, 0x70bd27, 0x25dfdbfd, {0xa, 0x14, 0xa0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10)
vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10)
io_setup(0x7, &(0x7f0000000480)=<r3=>0x0)
io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380})
sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={<r4=>0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc)
r5 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
recvfrom(r5, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@hci={0x1f, r4}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r0, &(0x7f0000000000)=0xf, 0xd)

03:42:53 executing program 1:
prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f")

[ 2533.436309] kauditd_printk_skb: 11 callbacks suppressed
[ 2533.436322] audit: type=1400 audit(2000000573.800:3525): avc:  denied  { map } for  pid=28682 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:54 executing program 1:
prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f")

03:42:54 executing program 4:
prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil)
gettid()
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140))
getpgrp(0x0)
accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10)
recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380})
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
dup(0xffffffffffffffff)
geteuid()
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000240))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300))
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0)
ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0))
getpgid(0x0)
wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340))
getpgrp(0x0)
socket(0x0, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30)

[ 2534.511603] audit: type=1400 audit(2000000574.880:3526): avc:  denied  { map } for  pid=28687 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2534.611399] audit: type=1400 audit(2000000574.980:3527): avc:  denied  { map } for  pid=28695 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2534.778978] audit: type=1400 audit(2000000575.150:3528): avc:  denied  { map } for  pid=28697 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:55 executing program 0:
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3)

03:42:55 executing program 2:
prctl$setptracer(0x59616d61, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:55 executing program 1:
prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f")

[ 2535.328995] audit: type=1400 audit(2000000575.700:3529): avc:  denied  { map } for  pid=28701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2535.387746] audit: type=1400 audit(2000000575.750:3530): avc:  denied  { map } for  pid=28704 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2535.435899] audit: type=1400 audit(2000000575.800:3531): avc:  denied  { map } for  pid=28706 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:56 executing program 1:
prctl$setname(0x7, &(0x7f0000000380)='/dev/midi#\x00')
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000002c0)="f942805da0690a0d01eece41ff0f1837370f38211ac4410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe29c4b7f")

[ 2536.221483] audit: type=1400 audit(2000000576.590:3532): avc:  denied  { map } for  pid=28708 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:57 executing program 1:
r0 = socket$packet(0x11, 0x3, 0x300)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10)
shutdown(0xffffffffffffffff, 0x0)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10)

[ 2537.095180] audit: type=1400 audit(2000000577.460:3533): avc:  denied  { map } for  pid=28711 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2537.184666] audit: type=1400 audit(2000000577.500:3534): avc:  denied  { map } for  pid=28713 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:57 executing program 4:
prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil)
gettid()
openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0)
ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140))
getpgrp(0x0)
accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10)
recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380})
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)})
dup(0xffffffffffffffff)
geteuid()
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400))
fstat(0xffffffffffffffff, &(0x7f0000000240))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000180))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300))
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000840)=ANY=[], 0x0)
ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0))
getpgid(0x0)
wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340))
getpgrp(0x0)
socket(0x0, 0x0, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30)

03:42:57 executing program 0:
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3)

03:42:57 executing program 5:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
io_setup(0x0, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0)
socket$key(0xf, 0x3, 0x2)
utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0))
getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0))
getgroups(0x0, &(0x7f0000000200))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getegid()
getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8)
fstat(0xffffffffffffffff, &(0x7f0000000540))
ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0))
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28)
getgroups(0x0, &(0x7f0000000480))
fchown(0xffffffffffffffff, 0x0, 0x0)
syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f")

03:42:57 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffe1, 0x0)
ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={<r2=>0x0, 0x3}, &(0x7f0000000180)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0xb0, 0xe4, 0x8002, 0x5, 0x9, 0x0, 0x9, 0x7c71b77, r2}, &(0x7f0000000280)=0x20)
setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000007c0)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68)
getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700))
bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
setxattr(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)=@random={'user.', 'gretap0\x00'}, &(0x7f0000000a80)='*vmnet0\x00', 0x8, 0x1)
futimesat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300))
connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff)
write$P9_RUNLINKAT(r1, &(0x7f0000000780)={0x7, 0x4d, 0x1}, 0x7)
keyctl$restrict_keyring(0x1d, r4, &(0x7f00000003c0)='blacklist\x00', &(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00')
sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)
getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x200000000020, 0x8000}, &(0x7f00000001c0)=0x10)
sendmsg$can_bcm(r1, &(0x7f00000009c0)={&(0x7f00000008c0), 0x10, &(0x7f0000000980)={&(0x7f0000000900)={0x7, 0x1, 0x234, {}, {0x0, 0x7530}, {0x4, 0x4, 0x9, 0x4}, 0x1, @can={{0x3, 0x200000000000, 0xfc50, 0x5}, 0x5, 0x1, 0x0, 0x0, "aa50b98ae9709e48"}}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x80)
getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x9, 0x40, 0x1, 0x2, 0xc6d, 0xb5, 0x400, {0x0, @in={{0x2, 0x4e21, @remote}}, 0x9, 0x4, 0x4, 0x7}}, &(0x7f0000000400)=0xb0)
stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
r6 = getegid()
write$P9_RGETATTR(r1, &(0x7f00000005c0)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x2, 0x6}, 0x4, r5, r6, 0x100, 0x3, 0x8000, 0x8e, 0x8a2, 0x9, 0x0, 0xffff, 0x5, 0x0, 0xa4e1, 0x100000000, 0x4, 0x7, 0x7}}, 0xa0)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000009080)={0x0, 0x7}, &(0x7f00000090c0)=0x8)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x3, 0x0)
ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000740)={'gretap0\x00', {0x2, 0x4e22, @rand_addr=0x318}})
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000009100)=ANY=[], &(0x7f0000009140))

03:42:58 executing program 0:
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3)

03:42:58 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240))
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:42:58 executing program 2:
prctl$setptracer(0x59616d61, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=""/87}, 0x18)
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:42:58 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1)
openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0)

03:42:58 executing program 0:
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000180)=""/243, &(0x7f0000000000)=0xf3)

03:42:58 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = getpgrp(0x0)
migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7)

[ 2538.443073] kauditd_printk_skb: 11 callbacks suppressed
[ 2538.443087] audit: type=1400 audit(2000000578.810:3546): avc:  denied  { map } for  pid=28751 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:42:58 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = getpgrp(0x0)
migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7)

03:42:58 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = getpgrp(0x0)
migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7)

03:42:59 executing program 4:
r0 = socket$inet6(0xa, 0x80003, 0x800000000000006)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = getpgrp(0x0)
migrate_pages(r1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x7)

[ 2538.645602] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
03:42:59 executing program 0:
socket$unix(0x1, 0x2, 0x0)
futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240))
syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
getpgid(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map})
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00')
sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0)

[ 2538.718574] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2538.823393] audit: type=1400 audit(2000000579.190:3547): avc:  denied  { map } for  pid=28769 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2538.897399] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2538.922878] audit: type=1400 audit(2000000579.290:3548): avc:  denied  { map } for  pid=28773 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2538.950338] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2539.032513] audit: type=1400 audit(2000000579.400:3549): avc:  denied  { map } for  pid=28776 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2539.119573] audit: type=1400 audit(2000000579.490:3550): avc:  denied  { create } for  pid=28774 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2539.334459] audit: type=1400 audit(2000000579.700:3551): avc:  denied  { map } for  pid=28779 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:00 executing program 5:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
io_setup(0x0, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0)
socket$key(0xf, 0x3, 0x2)
utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0))
getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0))
getgroups(0x0, &(0x7f0000000200))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getegid()
getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8)
fstat(0xffffffffffffffff, &(0x7f0000000540))
ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0))
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28)
getgroups(0x0, &(0x7f0000000480))
fchown(0xffffffffffffffff, 0x0, 0x0)
syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f")

03:43:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

03:43:00 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240))
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:00 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1)
openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0)

03:43:00 executing program 2:
sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/47)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000340)=0x98)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000440)=0x90)
getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}}, &(0x7f0000000540)=0xb0)
ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000580))
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
connect$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @host}, 0x10)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setattr(0x0, &(0x7f0000000000), 0x0)
ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
socket$inet_dccp(0x2, 0x6, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x78)
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0))
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="66b85f008ee0660fc62b5f67d9f8f3af0f30c4e27d908cd43437063fd93c11f30f38f61d79450000b850a400000f23d00f21f835100000040f23f866bad004ec", 0x40}], 0x1, 0x0, &(0x7f0000000080), 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000))
ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000680)=""/37)
perf_event_open(&(0x7f000001d000)={0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600), 0x0)
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240))
sched_setaffinity(0x0, 0x7, &(0x7f00000000c0))
syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721")

[ 2539.686627] audit: type=1326 audit(2000000580.030:3552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000
[ 2539.778444] audit: type=1326 audit(2000000580.050:3553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000
[ 2539.804410] audit: type=1326 audit(2000000580.060:3554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000
03:43:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

[ 2539.969406] audit: type=1326 audit(2000000580.060:3555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28782 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x50000
03:43:00 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240))
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

03:43:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

03:43:01 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240))
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000004c0))
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0)
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:01 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

[ 2541.643321] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2541.667363] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
03:43:02 executing program 0:
socket$unix(0x1, 0x2, 0x0)
futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240))
syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
getpgid(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map})
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00')
sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0)

03:43:02 executing program 5:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
io_setup(0x0, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0)
socket$key(0xf, 0x3, 0x2)
utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0))
getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0))
getgroups(0x0, &(0x7f0000000200))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getegid()
getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8)
fstat(0xffffffffffffffff, &(0x7f0000000540))
ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0))
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28)
getgroups(0x0, &(0x7f0000000480))
fchown(0xffffffffffffffff, 0x0, 0x0)
syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f")

03:43:02 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1)
openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0)

03:43:02 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

[ 2542.513631] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2542.528983] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
03:43:03 executing program 3:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe000081000000e8ffff3f03000000450001070000001419001a0004000200070002000200000800005d14a4e91ee400", 0x39}], 0x1)
openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0)

03:43:03 executing program 0:
socket$unix(0x1, 0x2, 0x0)
futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240))
syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
getpgid(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map})
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00')
sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0)

[ 2542.760609] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
[ 2542.838520] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
03:43:03 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000340)="66b9800000c00f32663500087f010f3066b93506000066b8215f000066ba000000000f30baf80c66b82228c58c66efbafc0cec640fc75d08262e3e0f013e9700bad10466b80060000066ef3e0f00d70fa545de0f20d86635200000000f22d80f67dc", 0x62}], 0x1, 0x0, &(0x7f0000000080), 0x0)

03:43:03 executing program 5:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
io_setup(0x0, &(0x7f0000000180))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0)
socket$key(0xf, 0x3, 0x2)
utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0))
getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0))
getgroups(0x0, &(0x7f0000000200))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getegid()
getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/184, &(0x7f0000000700)=0xb8)
fstat(0xffffffffffffffff, &(0x7f0000000540))
ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0))
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0, 0x9c, &(0x7f0000000800), &(0x7f0000000840)=""/156}, 0x28)
getgroups(0x0, &(0x7f0000000480))
fchown(0xffffffffffffffff, 0x0, 0x0)
syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f")

03:43:04 executing program 0:
socket$unix(0x1, 0x2, 0x0)
futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240))
syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480), &(0x7f0000000580))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
getpgid(0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000006c0)={'ip6gre0\x00', @ifru_map})
fstat(0xffffffffffffffff, &(0x7f0000000140))
socket$inet6_tcp(0xa, 0x1, 0x0)
syz_genetlink_get_family_id$fou(&(0x7f0000000740)='fou\x00')
sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0)

[ 2543.725812] kauditd_printk_skb: 366 callbacks suppressed
[ 2543.725825] audit: type=1400 audit(2000000584.090:3922): avc:  denied  { map } for  pid=28843 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2543.899684] audit: type=1400 audit(2000000584.270:3923): avc:  denied  { create } for  pid=28844 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2544.322355] audit: type=1400 audit(2000000584.690:3924): avc:  denied  { map } for  pid=28847 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2544.647729] audit: type=1400 audit(2000000585.010:3925): avc:  denied  { map } for  pid=28848 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:10 executing program 4:
r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1)
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff}, 0x40000013f}}, 0x20)
write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18)
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={<r5=>0xffffffffffffffff})
fchdir(r1)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=<r6=>0x0)
sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300))
r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2)
ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8)
ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0))
write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20)
write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70})
ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd})
socket(0x15, 0x0, 0x3ff)
sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe)
accept$nfc_llcp(r0, 0x0, &(0x7f0000000240))
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000})

03:43:10 executing program 3:
shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0)
shmdt(0x0)
syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0)
modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10)
set_mempolicy(0x0, &(0x7f0000000300), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080))
fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34)
ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'})
getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8)
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:10 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$nl_generic(0xa, 0x5, 0x84)
ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}})

03:43:10 executing program 2:
keyctl$set_reqkey_keyring(0x7, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8)
getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8)
getuid()
getuid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getegid()
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00))
fstat(0xffffffffffffff9c, &(0x7f0000000e80))
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)

03:43:10 executing program 5:
getrusage(0x1, &(0x7f0000000300))
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:43:10 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00')
pipe2$9p(&(0x7f0000000100)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7)
mkdir(&(0x7f0000000480)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}})
write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14)
write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}})
preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0)

03:43:10 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00')
pipe2$9p(&(0x7f0000000100)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7)
mkdir(&(0x7f0000000480)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}})
write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14)
write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}})
preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0)

03:43:10 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$nl_generic(0xa, 0x5, 0x84)
ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}})

[ 2549.929536] audit: type=1400 audit(2000000590.300:3926): avc:  denied  { map } for  pid=28865 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:10 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00')
pipe2$9p(&(0x7f0000000100)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7)
mkdir(&(0x7f0000000480)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}})
write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14)
write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}})
preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0)

03:43:10 executing program 5:
getrusage(0x1, &(0x7f0000000300))
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

[ 2550.032399] audit: type=1400 audit(2000000590.400:3927): avc:  denied  { map } for  pid=28869 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2550.056616] audit: type=1326 audit(2000000590.420:3928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=28859 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0
[ 2550.117947] audit: type=1400 audit(2000000590.480:3929): avc:  denied  { map } for  pid=28870 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2550.149982] audit: type=1400 audit(2000000590.510:3930): avc:  denied  { map } for  pid=28871 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:10 executing program 1:
r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00')
pipe2$9p(&(0x7f0000000100)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7)
mkdir(&(0x7f0000000480)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0xda3}}]}})
write$P9_RSYMLINK(r2, &(0x7f0000000500)={0x14, 0x11, 0x1}, 0x14)
write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0)
mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}})
preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0)

03:43:10 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$nl_generic(0xa, 0x5, 0x84)
ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}})

[ 2550.342519] audit: type=1400 audit(2000000590.710:3931): avc:  denied  { map } for  pid=28879 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2550.403390] audit: type=1400 audit(2000000590.770:3932): avc:  denied  { map } for  pid=28883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2550.511233] audit: type=1400 audit(2000000590.880:3933): avc:  denied  { map } for  pid=28886 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2550.573744] audit: type=1400 audit(2000000590.940:3934): avc:  denied  { map } for  pid=28887 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:11 executing program 1:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700))
mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

[ 2550.647971] audit: type=1400 audit(2000000591.010:3935): avc:  denied  { map } for  pid=28891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:11 executing program 3:
shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0)
shmdt(0x0)
syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0)
modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10)
set_mempolicy(0x0, &(0x7f0000000300), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080))
fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34)
ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'})
getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8)
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:11 executing program 5:
getrusage(0x1, &(0x7f0000000300))
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:43:11 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
r1 = socket$nl_generic(0xa, 0x5, 0x84)
ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xf}})

03:43:11 executing program 4:
r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1)
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff}, 0x40000013f}}, 0x20)
write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18)
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={<r5=>0xffffffffffffffff})
fchdir(r1)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=<r6=>0x0)
sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300))
r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2)
ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8)
ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0))
write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20)
write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000000008000000000000001200001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c08d72bbd4090349d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd6ac1375a6ef334187a54dd6bafb64bff875164306253783214393211f4602f57dfc94bb4658e4d7671404f2aceed78c8937adf1ebaf9b189a30617ba203f5f402ce3838e232c77703e76d6e681ed905eadf4c120500fc0a6d6347101d3824bb642ecb62972dc4d52d03803d977b15fd1b4defa"], 0x15e)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70})
ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd})
socket(0x15, 0x0, 0x3ff)
sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe)
accept$nfc_llcp(r0, 0x0, &(0x7f0000000240))
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000})

03:43:11 executing program 2:
keyctl$set_reqkey_keyring(0x7, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8)
getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8)
getuid()
getuid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getegid()
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00))
fstat(0xffffffffffffff9c, &(0x7f0000000e80))
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)

03:43:12 executing program 1:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700))
mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:12 executing program 0:
getpid()
getpid()
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680))
getpgid(0x0)
gettid()
getpgrp(0x0)
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000))
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
pipe2(&(0x7f00000000c0), 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380))
getpgid(0x0)
syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540))
syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00')
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080))
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)})
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
dup(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f")

03:43:12 executing program 5:
getrusage(0x1, &(0x7f0000000300))
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff")

03:43:12 executing program 4:
r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1)
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff}, 0x40000013f}}, 0x20)
write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18)
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={<r5=>0xffffffffffffffff})
fchdir(r1)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=<r6=>0x0)
sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300))
r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2)
ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8)
ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0))
write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20)
write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70})
ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd})
socket(0x15, 0x0, 0x3ff)
sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe)
accept$nfc_llcp(r0, 0x0, &(0x7f0000000240))
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000})

03:43:12 executing program 5:
socket$packet(0x11, 0x3, 0x300)
creat(&(0x7f0000000040)='./file0\x00', 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc)
setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84)
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e)
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440))
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480))

03:43:12 executing program 3:
shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0)
shmdt(0x0)
syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0)
modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10)
set_mempolicy(0x0, &(0x7f0000000300), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080))
fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34)
ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'})
getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8)
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:12 executing program 1:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700))
mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:13 executing program 2:
keyctl$set_reqkey_keyring(0x7, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8)
getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8)
getuid()
getuid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getegid()
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00))
fstat(0xffffffffffffff9c, &(0x7f0000000e80))
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)

03:43:13 executing program 0:
getpid()
getpid()
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680))
getpgid(0x0)
gettid()
getpgrp(0x0)
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000))
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
pipe2(&(0x7f00000000c0), 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380))
getpgid(0x0)
syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540))
syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00')
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080))
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)})
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
dup(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f")

03:43:13 executing program 4:
r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x1)
syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff}, 0x40000013f}}, 0x20)
write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18)
socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={<r5=>0xffffffffffffffff})
fchdir(r1)
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000005c0)=0x2)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=<r6=>0x0)
sched_setattr(r6, &(0x7f00000004c0)={0x30, 0x2, 0x1, 0xffffffffffffff81, 0x6, 0x9, 0x7f, 0x8}, 0x0)
ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000300))
r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="621543dad6771dfb8dea69403b1f38cd05e74e0679fd5eea26751f79db497be6f23993fd88573704063ae1352696232751e4a56a6955494ea67f24ca2bc92f5524388191203acb0024a7b52689d9dd348c19c93f0f9db204b37baadfc4ad434975178a7d5adcc6e73149ce75f7e9c3c7e5fe87595dcbab50a4c8a9612a783f8c40ddeea5f69c7ab6a8f141cecca69a7e76dcc9e47b28845fc0ae3134af95c62c9f675ec51424430c479b5481c019b90a4d9e78", @ANYRES32=0x0], &(0x7f0000000540)=0x2)
ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xa8)
ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0))
write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x117}}, 0x20)
write$binfmt_aout(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x15e)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r7, 0x5385, &(0x7f0000000380)={0x46, ""/70})
ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000c00)={@local, 0xd})
socket(0x15, 0x0, 0x3ff)
sendfile(r7, r7, &(0x7f00000000c0), 0x8080fffffffe)
accept$nfc_llcp(r0, 0x0, &(0x7f0000000240))
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000600)={0x8000})

03:43:13 executing program 1:
request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0)
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700))
mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:14 executing program 2:
keyctl$set_reqkey_keyring(0x7, 0x0)
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0)
clock_gettime(0x0, &(0x7f0000000140))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d")
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8)
getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8)
getuid()
getuid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8)
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc)
lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getegid()
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00))
fstat(0xffffffffffffff9c, &(0x7f0000000e80))
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000f00), 0x24, 0x0)
seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)})
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f")
openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8)
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8)

03:43:14 executing program 5:
socket$packet(0x11, 0x3, 0x300)
creat(&(0x7f0000000040)='./file0\x00', 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc)
setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84)
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e)
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440))
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480))

03:43:14 executing program 4:
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0)
open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0)
setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0)
writev(0xffffffffffffffff, &(0x7f0000000400), 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180))
syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00')
write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18)
seccomp(0x0, 0x0, &(0x7f0000000100))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540))
getgroups(0x0, &(0x7f00000025c0))
geteuid()
getegid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000002740))
fstat(0xffffffffffffffff, &(0x7f0000002b40))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f")

03:43:14 executing program 1:
memfd_create(&(0x7f00000008c0)="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", 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8)
getgroups(0x0, &(0x7f00000004c0))
setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
getgroups(0x0, &(0x7f0000000340))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0)
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb)
fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0))
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}})

03:43:15 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0)
accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0)
ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8)
getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840))
getgid()
lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0))
getegid()
fstat(0xffffffffffffffff, &(0x7f0000000940))
getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40))
getgid()
stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0))
getgroups(0x0, &(0x7f0000000b40))
lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0)
timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0)
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0))

03:43:15 executing program 0:
getpid()
getpid()
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680))
getpgid(0x0)
gettid()
getpgrp(0x0)
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000))
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
pipe2(&(0x7f00000000c0), 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380))
getpgid(0x0)
syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540))
syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00')
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080))
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)})
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
dup(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f")

03:43:15 executing program 3:
shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0)
shmdt(0x0)
syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0)
openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0)
modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10)
set_mempolicy(0x0, &(0x7f0000000300), 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080))
fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34)
ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0)
ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @remote}, &(0x7f0000000400)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000480)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000031c0)={0x0, @local, @multicast1}, &(0x7f0000000580)=0x79)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x0, &(0x7f0000003180))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003500)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003580)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000036c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003740)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003780)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003880)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000038c0)={{{@in, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000039c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000005680), 0x0, 0x0, &(0x7f0000005800)={0x0, 0x1c9c380})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005840)={'bridge_slave_0\x00'})
getpeername(0xffffffffffffffff, &(0x7f0000005940)=@hci, &(0x7f00000059c0)=0x80)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000064c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000065c0)=0xe8)
syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

[ 2554.954942] kauditd_printk_skb: 21 callbacks suppressed
[ 2554.954958] audit: type=1400 audit(2000000595.320:3957): avc:  denied  { map } for  pid=28975 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:15 executing program 1:
memfd_create(&(0x7f00000008c0)="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", 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8)
getgroups(0x0, &(0x7f00000004c0))
setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
getgroups(0x0, &(0x7f0000000340))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0)
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb)
fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0))
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}})

[ 2555.269969] audit: type=1400 audit(2000000595.640:3958): avc:  denied  { map } for  pid=28980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2555.399767] audit: type=1400 audit(2000000595.770:3959): avc:  denied  { create } for  pid=28981 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2555.449287] audit: type=1400 audit(2000000595.800:3960): avc:  denied  { prog_load } for  pid=28981 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:43:16 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0)
accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0)
ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8)
getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840))
getgid()
lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0))
getegid()
fstat(0xffffffffffffffff, &(0x7f0000000940))
getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40))
getgid()
stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0))
getgroups(0x0, &(0x7f0000000b40))
lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0)
timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0)
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0))

03:43:16 executing program 1:
memfd_create(&(0x7f00000008c0)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8)
getgroups(0x0, &(0x7f00000004c0))
setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
getgroups(0x0, &(0x7f0000000340))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0)
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb)
fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0))
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}})

[ 2556.134722] audit: type=1400 audit(2000000596.500:3961): avc:  denied  { map } for  pid=28993 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:16 executing program 5:
socket$packet(0x11, 0x3, 0x300)
creat(&(0x7f0000000040)='./file0\x00', 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc)
setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84)
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e)
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440))
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480))

[ 2556.302736] audit: type=1400 audit(2000000596.670:3962): avc:  denied  { map } for  pid=29000 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:16 executing program 1:
memfd_create(&(0x7f00000008c0)="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", 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8)
getgroups(0x0, &(0x7f00000004c0))
setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$getflags(0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
getgroups(0x0, &(0x7f0000000340))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
signalfd4(0xffffffffffffffff, &(0x7f0000000ac0), 0x8, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800), 0xc, &(0x7f0000000a40)={&(0x7f0000000840)=@gettfilter={0x24}, 0x24}}, 0x0)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00')
sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0)
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb)
fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000004c0))
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48)
ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'veth0\x00', {0x2, 0x0, @rand_addr}})

[ 2556.392324] audit: type=1400 audit(2000000596.760:3963): avc:  denied  { map } for  pid=29002 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2556.518932] audit: type=1400 audit(2000000596.890:3964): avc:  denied  { create } for  pid=28987 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2556.681150] audit: type=1400 audit(2000000597.050:3965): avc:  denied  { create } for  pid=29003 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2556.706093] audit: type=1400 audit(2000000597.050:3966): avc:  denied  { prog_load } for  pid=29003 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:43:17 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0)
accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0)
ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8)
getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840))
getgid()
lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0))
getegid()
fstat(0xffffffffffffffff, &(0x7f0000000940))
getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40))
getgid()
stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0))
getgroups(0x0, &(0x7f0000000b40))
lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0)
timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0)
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0))

03:43:17 executing program 2:
r0 = socket$inet_sctp(0x2, 0x1, 0x84)
sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
shutdown(r0, 0x1)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, 0x8)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240), 0x8)

03:43:17 executing program 1:
memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0)
syncfs(0xffffffffffffffff)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0)
syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900))
stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980))
lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0))
fstat(0xffffffffffffffff, &(0x7f0000001e00))
getgid()
getpid()
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8)
getegid()
getpgrp(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000002580))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180))
getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0))
lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740))
getpid()
geteuid()
stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc)
stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
getegid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8)
getgroups(0x0, &(0x7f0000003480))
getpgid(0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8)
getegid()
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")

03:43:18 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000b40)=0xc)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0)
accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0)
ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244)
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8)
getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840))
getgid()
lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0))
getegid()
fstat(0xffffffffffffffff, &(0x7f0000000940))
getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40))
getgid()
stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0))
getgroups(0x0, &(0x7f0000000b40))
lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000b80), 0x24, 0x0)
timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000280)}}, &(0x7f0000000340))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f")
signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0)
readv(0xffffffffffffffff, &(0x7f0000000000), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000000400), &(0x7f00000000c0))
timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x7}}, &(0x7f000004afe0))

03:43:18 executing program 0:
getpid()
getpid()
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680))
getpgid(0x0)
gettid()
getpgrp(0x0)
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000))
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340))
pipe2(&(0x7f00000000c0), 0x0)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000380))
getpgid(0x0)
syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'})
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000540))
syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00')
ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000500))
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080))
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)})
request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc)
keyctl$set_timeout(0xf, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8)
getgid()
write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e)
signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8)
setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0xffffffffffffffcc)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0))
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
dup(0xffffffffffffffff)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f00000006c0)="428055a0876969ef69dc00d990c841ff0f183737c4c19086d9f28fc9410feefa4e2179fbe5e54175455d1a010d64ac1e5d31a3b786e2989f7f")

03:43:18 executing program 3:
clock_gettime(0x7, &(0x7f0000000140))
openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200))
getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4)
syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14)
recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee)
getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0)
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380))
syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8)

03:43:18 executing program 1:
memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0)
syncfs(0xffffffffffffffff)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0)
syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900))
stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980))
lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0))
fstat(0xffffffffffffffff, &(0x7f0000001e00))
getgid()
getpid()
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8)
getegid()
getpgrp(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000002580))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180))
getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0))
lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740))
getpid()
geteuid()
stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc)
stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
getegid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8)
getgroups(0x0, &(0x7f0000003480))
getpgid(0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8)
getegid()
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")

03:43:19 executing program 4:
mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil)
setrlimit(0x0, &(0x7f0000000400))
select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400})
add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd)
memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0)
ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0))
open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc)
keyctl$setperm(0x12, 0x0, 0x0)
memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000680)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000940)={@dev}, &(0x7f0000000980)=0x14)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c40)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000e00)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e40)={@remote, @multicast1}, &(0x7f0000000e80)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f00000028c0), &(0x7f0000002900)=0x14, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002940)={'vcan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'veth0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002c40)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004540)={'team0\x00'})
recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004e40)={&(0x7f0000004580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004d80)}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000005080)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f0000009280), 0x0, 0x0, &(0x7f0000009440)={0x77359400})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009980)={@remote, @rand_addr}, &(0x7f00000099c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f40)={'team0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000012280)={{{@in=@loopback, @in6}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000012380)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f00000123c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000012400)=0x14, 0x0)
getpeername$packet(0xffffffffffffffff, &(0x7f00000124c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000012500)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000012540)={@dev}, &(0x7f0000012580)=0x14)
accept$packet(0xffffffffffffffff, &(0x7f00000125c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000012600)=0x14)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000012f00)={&(0x7f0000000500), 0xc, &(0x7f0000012ec0)={&(0x7f0000012640)={0x14}, 0x14}}, 0x0)
faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0)
eventfd(0x0)
accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c)
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14)
syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f")

03:43:19 executing program 1:
memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0)
syncfs(0xffffffffffffffff)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0)
syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900))
stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980))
lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0))
fstat(0xffffffffffffffff, &(0x7f0000001e00))
getgid()
getpid()
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8)
getegid()
getpgrp(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000002580))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180))
getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0))
lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740))
getpid()
geteuid()
stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc)
stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
getegid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8)
getgroups(0x0, &(0x7f0000003480))
getpgid(0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8)
getegid()
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")

03:43:20 executing program 1:
memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0)
syncfs(0xffffffffffffffff)
getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000500)=0x24)
fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x7}, 0x28, 0x0)
syz_emit_ethernet(0x42, &(0x7f0000000540)={@empty, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @loopback, @link_local, @mcast2}}}}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0)
accept4$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc)
getuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900))
stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980))
lstat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001dc0))
fstat(0xffffffffffffffff, &(0x7f0000001e00))
getgid()
getpid()
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002400)=0xe8)
getegid()
getpgrp(0xffffffffffffffff)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002540)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000002580))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180))
getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0))
lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740))
getpid()
geteuid()
stat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc)
stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80))
fstat(0xffffffffffffffff, &(0x7f0000002dc0))
getegid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000032c0)='\x00'}, 0x30)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003340)={{{@in=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003440)=0xe8)
getgroups(0x0, &(0x7f0000003480))
getpgid(0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000035c0)=0xe8)
getegid()
getpgid(0xffffffffffffffff)
lstat(&(0x7f0000005a80)='./file0\x00', &(0x7f0000005ac0))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")

03:43:20 executing program 5:
socket$packet(0x11, 0x3, 0x300)
creat(&(0x7f0000000040)='./file0\x00', 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc)
setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000240), 0x84)
seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)})
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4)
getpeername$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000400)=0x6e)
socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0)
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440))
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000480))

[ 2560.025902] kauditd_printk_skb: 7 callbacks suppressed
[ 2560.025916] audit: type=1400 audit(2000000600.390:3974): avc:  denied  { map } for  pid=29044 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:20 executing program 4:
pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00')
pipe(&(0x7f0000000700))
sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163)
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040))
chroot(&(0x7f00000000c0)='./file0\x00')
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0))
syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200))
accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0)
setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14)
accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8)
clock_gettime(0x0, &(0x7f0000004680))
recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0)
accept$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0))
syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

[ 2560.109944] audit: type=1400 audit(2000000600.480:3975): avc:  denied  { create } for  pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2560.163580] audit: type=1400 audit(2000000600.530:3976): avc:  denied  { map } for  pid=29050 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:20 executing program 4:
pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00')
pipe(&(0x7f0000000700))
sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163)
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040))
chroot(&(0x7f00000000c0)='./file0\x00')
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0))
syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200))
accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0)
setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14)
accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8)
clock_gettime(0x0, &(0x7f0000004680))
recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0)
accept$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0))
syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

[ 2560.294837] audit: type=1400 audit(2000000600.660:3977): avc:  denied  { create } for  pid=29048 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2560.444325] audit: type=1400 audit(2000000600.810:3978): avc:  denied  { create } for  pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2560.482527] audit: type=1400 audit(2000000600.850:3979): avc:  denied  { create } for  pid=29053 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:21 executing program 2:
unshare(0x0)
futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0)
openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5)
getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='com.apple.system.Security\x00')
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")
socket$inet_tcp(0x2, 0x1, 0x0)
openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0)
chroot(&(0x7f0000000280)='./file0\x00')
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0)
openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0)
ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000240))
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff)
lookup_dcookie(0x0, &(0x7f0000000540)=""/170, 0xaa)
pipe2(&(0x7f0000000000), 0x0)
seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)})
setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'rr\x00'}, 0x2c)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000140)={0x0, @aes128, 0x0, "14298bdb68db4eac"})
signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8)

03:43:21 executing program 4:
pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00')
pipe(&(0x7f0000000700))
sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163)
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040))
chroot(&(0x7f00000000c0)='./file0\x00')
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0))
syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200))
accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0)
setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14)
accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8)
clock_gettime(0x0, &(0x7f0000004680))
recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0)
accept$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0))
syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

[ 2560.653387] audit: type=1400 audit(2000000601.010:3980): avc:  denied  { create } for  pid=29037 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:21 executing program 4:
pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00')
pipe(&(0x7f0000000700))
sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163)
seccomp(0x0, 0x0, &(0x7f0000000100))
syz_emit_ethernet(0x0, &(0x7f0000004700)=ANY=[], &(0x7f0000000040))
chroot(&(0x7f00000000c0)='./file0\x00')
openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0))
syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f")
socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200))
accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0)
setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@local}, &(0x7f0000000600)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14)
accept(0xffffffffffffffff, &(0x7f0000000740)=@ll, &(0x7f00000006c0)=0x80)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8)
clock_gettime(0x0, &(0x7f0000004680))
recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, &(0x7f00000046c0))
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'ifb0\x00'})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007880)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f00000078c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007900)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b00)={@ipv4={[], [], @broadcast}}, &(0x7f0000007b40)=0x2df)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000080c0)={@remote}, &(0x7f0000008100)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008140)={{{@in6=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000008240)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000008280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000082c0)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008300)={@local}, &(0x7f0000008340)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008380)={@loopback, @broadcast}, &(0x7f00000083c0)=0xc)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008540)={'team0\x00'})
getpeername$packet(0xffffffffffffffff, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000085c0)=0x14)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008c00)={&(0x7f0000000340), 0xc, &(0x7f0000008bc0)={&(0x7f0000004880)=ANY=[]}}, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0)
accept$alg(0xffffffffffffffff, 0x0, 0x0)
ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0))
syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

[ 2560.878995] audit: type=1400 audit(2000000601.250:3981): avc:  denied  { create } for  pid=29057 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2560.935900] audit: type=1400 audit(2000000601.290:3982): avc:  denied  { map } for  pid=29062 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2560.968331] audit: type=1400 audit(2000000601.300:3983): avc:  denied  { map } for  pid=29060 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:21 executing program 3:
clock_gettime(0x7, &(0x7f0000000140))
openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200))
getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4)
syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14)
recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee)
getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0)
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380))
syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8)

03:43:21 executing program 1:
socket$inet6_dccp(0xa, 0x6, 0x0)
connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153)
set_tid_address(&(0x7f0000000180))
accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4)
ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244)
clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0))
openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0)
gettid()
recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940))
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"})
semget$private(0x0, 0x0, 0x0)
bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480))
kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600))
clock_gettime(0x0, &(0x7f0000000740))
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880))
socket$packet(0x11, 0x0, 0x300)

03:43:21 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
close(r1)

03:43:21 executing program 4:
r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0)
r1 = dup2(r0, r0)
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040))

03:43:21 executing program 4:
syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}})
prctl$intptr(0x0, 0x0)
syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14)
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e)
syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8)
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:43:22 executing program 1:
socket$inet6_dccp(0xa, 0x6, 0x0)
connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153)
set_tid_address(&(0x7f0000000180))
accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4)
ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244)
clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0))
openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0)
gettid()
recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940))
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"})
semget$private(0x0, 0x0, 0x0)
bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480))
kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600))
clock_gettime(0x0, &(0x7f0000000740))
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880))
socket$packet(0x11, 0x0, 0x300)

03:43:22 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
close(r1)

03:43:22 executing program 4:
syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}})
prctl$intptr(0x0, 0x0)
syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14)
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e)
syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8)
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:43:22 executing program 2:
openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0)
ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0)
fcntl$setflags(0xffffffffffffffff, 0x2, 0x0)
setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10)
write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0)
epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000240), 0x8)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000900))
fstat(0xffffffffffffffff, &(0x7f0000000980))
getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80))
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000bc0)=0xe8)
stat(&(0x7f0000000c80)='./file0/file0\x00', &(0x7f0000000cc0))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d40))
geteuid()
getgroups(0x0, &(0x7f0000000d80))
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40))
getgid()
accept$alg(0xffffffffffffffff, 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e80))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000fc0)=0xe8)
getegid()
getpgid(0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001000)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001100)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240))
getegid()
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002700))
getresuid(&(0x7f0000002740), &(0x7f0000002780), &(0x7f00000027c0))
getgid()
gettid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d80)={{{@in6=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000002e80)=0xe8)
lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002f80))
stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000))
lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40))
fstat(0xffffffffffffffff, &(0x7f0000003a80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc)
getpid()
geteuid()
fstat(0xffffffffffffffff, &(0x7f0000003b80))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c00))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c40)={{{@in=@remote, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003d40)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003e00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000003f40)=0xe8)
lstat(&(0x7f0000003f80)='./file0\x00', &(0x7f0000003fc0))
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000004140)=0xe8)
lstat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005b80))
getuid()
getresgid(&(0x7f0000005bc0), &(0x7f0000005c00), &(0x7f0000005c40))
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
getpid()
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340))
getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480))
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0))
getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580))
getegid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940))
getuid()
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000c00), 0x14)
gettid()
syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")

03:43:22 executing program 5:
socket$inet6(0xa, 0x1000000000002, 0x0)
gettid()
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'})
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1})
timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000))
inotify_init()
signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00')
socket$nl_generic(0x10, 0x3, 0x10)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0)
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400))
socket$inet(0x2, 0x0, 0x0)
mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10)

03:43:23 executing program 1:
socket$inet6_dccp(0xa, 0x6, 0x0)
connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153)
set_tid_address(&(0x7f0000000180))
accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4)
ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244)
clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0))
openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0)
gettid()
recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940))
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"})
semget$private(0x0, 0x0, 0x0)
bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480))
kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600))
clock_gettime(0x0, &(0x7f0000000740))
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880))
socket$packet(0x11, 0x0, 0x300)

03:43:23 executing program 4:
syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}})
prctl$intptr(0x0, 0x0)
syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14)
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e)
syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8)
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:43:24 executing program 3:
clock_gettime(0x7, &(0x7f0000000140))
openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200))
getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4)
syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14)
recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee)
getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0)
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380))
syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8)

03:43:24 executing program 1:
socket$inet6_dccp(0xa, 0x6, 0x0)
connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80)
syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[])
prctl$getname(0x10, &(0x7f0000000200)=""/133)
semget$private(0x0, 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0)
open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153)
set_tid_address(&(0x7f0000000180))
accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4)
ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244)
clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0))
openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0)
gettid()
recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940))
ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"})
semget$private(0x0, 0x0, 0x0)
bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480))
kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600))
clock_gettime(0x0, &(0x7f0000000740))
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880))
socket$packet(0x11, 0x0, 0x300)

03:43:24 executing program 4:
syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x40)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000640)={{}, 0x0, [], {0x77359400}})
prctl$intptr(0x0, 0x0)
syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x0, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@loopback}, &(0x7f00000004c0)=0x14)
getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/62, &(0x7f0000000380)=0x3e)
syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00')
write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8)
syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:43:24 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240))
fcntl$getown(0xffffffffffffff9c, 0x9)
getuid()
getgid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0))
lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540))
stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
getpgrp(0x0)
fstat(0xffffffffffffffff, &(0x7f00000017c0))
lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc)
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc)
gettid()
seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:43:25 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48)
clock_gettime(0x0, &(0x7f00000000c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140))
connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10)
dup(0xffffffffffffffff)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev})
recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0)
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1)
ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'})
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700))
write(0xffffffffffffffff, &(0x7f0000000340), 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8)
getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc)
setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:43:25 executing program 3:
clock_gettime(0x7, &(0x7f0000000140))
openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200))
getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4)
syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f")
getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@local, @multicast2}, &(0x7f0000000d80)=0xc)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @rand_addr}, &(0x7f0000000e40)=0xc)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'vcan0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001580)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000015c0)={@local}, &(0x7f0000001600)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000001880)=0xe8)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@remote}, &(0x7f0000001900)=0x14)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @remote}, &(0x7f0000001980)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f00000019c0), &(0x7f0000001a00)=0x14)
recvmmsg(0xffffffffffffffff, &(0x7f000000a140), 0x0, 0x0, &(0x7f000000a380)={0x77359400})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a600)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f000000a700)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000a740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a780)=0x14, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f000000ab80)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000ac00)=0x14, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac40)={'team0\x00'})
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac80)={{{@in6=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xfffffdee)
getsockname$packet(0xffffffffffffffff, &(0x7f000000adc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ae00)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ae80)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000af80)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000afc0)={'team0\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b000)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000b100)=0xe8)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000b3c0)=0xe8)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000be00)={&(0x7f00000007c0), 0xc, &(0x7f000000bdc0)={&(0x7f000000b400)=ANY=[]}}, 0x0)
ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000480))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10)
ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000380))
syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00')
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8)

03:43:25 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
close(r1)

03:43:25 executing program 4:
sched_rr_get_interval(0x0, &(0x7f0000000400))
openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380})
lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8)
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80))
getuid()
fstat(0xffffffffffffffff, &(0x7f0000000e00))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001a00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc)
lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0))
lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40))
getegid()
lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000))
getegid()
getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580))
getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8)
getgroups(0x0, &(0x7f0000003b00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8)
getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00))
getuid()
getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99)
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)})
dup(0xffffffffffffffff)
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8)
getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:43:25 executing program 5:
socket$inet6(0xa, 0x1000000000002, 0x0)
gettid()
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'})
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1})
timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000))
inotify_init()
signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00')
socket$nl_generic(0x10, 0x3, 0x10)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0)
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400))
socket$inet(0x2, 0x0, 0x0)
mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10)

[ 2565.362936] kauditd_printk_skb: 23 callbacks suppressed
[ 2565.362951] audit: type=1400 audit(2000000605.730:4007): avc:  denied  { map } for  pid=29144 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:25 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240))
fcntl$getown(0xffffffffffffff9c, 0x9)
getuid()
getgid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0))
lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540))
stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
getpgrp(0x0)
fstat(0xffffffffffffffff, &(0x7f00000017c0))
lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc)
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc)
gettid()
seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

[ 2565.529429] audit: type=1400 audit(2000000605.900:4008): avc:  denied  { map } for  pid=29151 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:26 executing program 4:
sched_rr_get_interval(0x0, &(0x7f0000000400))
openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380})
lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8)
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80))
getuid()
fstat(0xffffffffffffffff, &(0x7f0000000e00))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001a00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc)
lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0))
lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40))
getegid()
lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000))
getegid()
getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580))
getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8)
getgroups(0x0, &(0x7f0000003b00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8)
getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00))
getuid()
getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99)
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)})
dup(0xffffffffffffffff)
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8)
getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

[ 2565.734997] audit: type=1400 audit(2000000606.100:4009): avc:  denied  { prog_load } for  pid=29138 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:43:26 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
close(r1)

[ 2566.168927] audit: type=1400 audit(2000000606.540:4010): avc:  denied  { create } for  pid=29162 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:26 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240))
fcntl$getown(0xffffffffffffff9c, 0x9)
getuid()
getgid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0))
lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540))
stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
getpgrp(0x0)
fstat(0xffffffffffffffff, &(0x7f00000017c0))
lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc)
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc)
gettid()
seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

[ 2566.367045] audit: type=1400 audit(2000000606.730:4011): avc:  denied  { map } for  pid=29168 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2566.403572] audit: type=1400 audit(2000000606.770:4012): avc:  denied  { map } for  pid=29169 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2566.476201] audit: type=1400 audit(2000000606.840:4013): avc:  denied  { map } for  pid=29172 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2566.501149] audit: type=1400 audit(2000000606.870:4014): avc:  denied  { map } for  pid=29173 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2566.526992] audit: type=1400 audit(2000000606.900:4015): avc:  denied  { create } for  pid=29162 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:27 executing program 4:
sched_rr_get_interval(0x0, &(0x7f0000000400))
openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380})
lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8)
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80))
getuid()
fstat(0xffffffffffffffff, &(0x7f0000000e00))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001a00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc)
lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0))
lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40))
getegid()
lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000))
getegid()
getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580))
getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8)
getgroups(0x0, &(0x7f0000003b00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8)
getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00))
getuid()
getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99)
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)})
dup(0xffffffffffffffff)
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8)
getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:43:27 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48)
clock_gettime(0x0, &(0x7f00000000c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140))
connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10)
dup(0xffffffffffffffff)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev})
recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0)
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1)
ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'})
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700))
write(0xffffffffffffffff, &(0x7f0000000340), 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8)
getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc)
setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:43:27 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48)
r0 = socket$kcm(0x2, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0)

[ 2566.702913] audit: type=1400 audit(2000000607.070:4016): avc:  denied  { map } for  pid=29178 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:27 executing program 1:
rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x20, 0x1, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240))
fcntl$getown(0xffffffffffffff9c, 0x9)
getuid()
getgid()
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0))
lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540))
stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600))
getpgrp(0x0)
fstat(0xffffffffffffffff, &(0x7f00000017c0))
lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc)
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc)
gettid()
seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:43:28 executing program 1:
shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil)
getgid()
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0))
getuid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0))
geteuid()
getpgrp(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400))
lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0))
getuid()
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000001700))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8)
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:28 executing program 4:
sched_rr_get_interval(0x0, &(0x7f0000000400))
openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380})
lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0)
ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0))
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8)
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80))
getuid()
fstat(0xffffffffffffffff, &(0x7f0000000e00))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8)
fstat(0xffffffffffffffff, &(0x7f0000001a00))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc)
lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40))
getuid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0))
lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40))
getegid()
lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000))
getegid()
getresuid(&(0x7f0000002400), &(0x7f0000002540), &(0x7f0000002580))
getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003ac0)=0xe8)
getgroups(0x0, &(0x7f0000003b00))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast1}}}, &(0x7f0000003c40)=0xe8)
getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00))
getuid()
getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000180)=""/99)
inotify_init()
seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)})
dup(0xffffffffffffffff)
fstat(0xffffffffffffffff, &(0x7f0000001dc0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40))
lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8)
getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")

03:43:28 executing program 0:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:30 executing program 5:
socket$inet6(0xa, 0x1000000000002, 0x0)
gettid()
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'})
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1})
timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000))
inotify_init()
signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00')
socket$nl_generic(0x10, 0x3, 0x10)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0)
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400))
socket$inet(0x2, 0x0, 0x0)
mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10)

03:43:30 executing program 1:
shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil)
getgid()
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0))
getuid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0))
geteuid()
getpgrp(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400))
lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0))
getuid()
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000001700))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8)
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:30 executing program 4:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

03:43:30 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48)
r0 = socket$kcm(0x2, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0)

03:43:30 executing program 4:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

03:43:30 executing program 4:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

[ 2570.524731] kauditd_printk_skb: 13 callbacks suppressed
[ 2570.524744] audit: type=1400 audit(2000000610.890:4030): avc:  denied  { map } for  pid=29222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2570.564692] audit: type=1400 audit(2000000610.910:4031): avc:  denied  { create } for  pid=29209 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:31 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48)
clock_gettime(0x0, &(0x7f00000000c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140))
connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10)
dup(0xffffffffffffffff)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev})
recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0)
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1)
ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'})
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700))
write(0xffffffffffffffff, &(0x7f0000000340), 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8)
getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc)
setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:43:31 executing program 1:
shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil)
getgid()
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0))
getuid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0))
geteuid()
getpgrp(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400))
lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0))
getuid()
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000001700))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8)
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:31 executing program 4:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

03:43:31 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48)
r0 = socket$kcm(0x2, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0)

03:43:31 executing program 0:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

[ 2570.644649] audit: type=1400 audit(2000000611.010:4032): avc:  denied  { map } for  pid=29226 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2570.671501] audit: type=1400 audit(2000000611.010:4033): avc:  denied  { prog_load } for  pid=29224 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
[ 2570.713796] audit: type=1400 audit(2000000611.080:4034): avc:  denied  { map } for  pid=29227 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2570.760959] audit: type=1400 audit(2000000611.130:4035): avc:  denied  { prog_load } for  pid=29233 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:43:31 executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="18008e9b7a00000000000000e7564e7b43b28e"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000140)=""/31}, 0x48)
r0 = socket$kcm(0x2, 0x2, 0x0)
sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, "4404"}], 0x18}, 0x0)

03:43:31 executing program 5:
socket$inet6(0xa, 0x1000000000002, 0x0)
gettid()
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'lo\x00'})
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@mcast1})
timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000))
inotify_init()
signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00')
socket$nl_generic(0x10, 0x3, 0x10)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0)
ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000400))
socket$inet(0x2, 0x0, 0x0)
mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004)
syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00')
sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10)

03:43:31 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

[ 2571.304723] audit: type=1400 audit(2000000611.670:4036): avc:  denied  { map } for  pid=29238 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2571.328670] audit: type=1400 audit(2000000611.670:4037): avc:  denied  { map } for  pid=29237 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:31 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

[ 2571.425274] audit: type=1400 audit(2000000611.790:4038): avc:  denied  { map } for  pid=29243 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:31 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:31 executing program 1:
shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil)
getgid()
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0))
getuid()
fcntl$getown(0xffffffffffffffff, 0x9)
getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780))
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940))
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0))
geteuid()
getpgrp(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001440)=0xe8)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0)
getpid()
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400))
lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001500))
getpgid(0xffffffffffffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001680)=0xe8)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0))
getuid()
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
getpid()
fstat(0xffffffffffffffff, &(0x7f0000001700))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001d40)=0xe8)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004300)=0xe8)
getpid()
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000066c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}}}, &(0x7f00000067c0)=0xe8)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006800))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

[ 2571.541906] audit: type=1400 audit(2000000611.910:4040): avc:  denied  { prog_load } for  pid=29242 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0
03:43:32 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:32 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48)
clock_gettime(0x0, &(0x7f00000000c0))
recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140))
connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10)
dup(0xffffffffffffffff)
ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev})
recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0)
getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/238, &(0x7f0000000040)=0xee)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10)
getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=""/241, &(0x7f0000000080)=0xf1)
ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'irlan0\x00'})
openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0)
ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000700))
write(0xffffffffffffffff, &(0x7f0000000340), 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0))
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8)
getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc)
setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001080)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000c40, 0x0, 0x0, 0x20000c70, 0x20000e10], 0x0, &(0x7f0000000840), &(0x7f00000018c0)=ANY=[]}, 0x78)
ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000740)=""/209)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f")

03:43:32 executing program 3:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

03:43:32 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:32 executing program 0:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:32 executing program 4:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:32 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = memfd_create(&(0x7f00000000c0)="7dbf2a78892d764fd34a556b884fc44e1d3903c25662e82a6cdc43eba6e41224d1a37a7a85f41eccfcf6b65f5fcaef1b9d0e50771b4e5b81921550c50e061708af0a75d844397a9e52086a68cea96adaf842848d122eeb959a0ab24dc7d1874ec54f7322fc0cfafe", 0x0)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x51, r1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000e80)=@ethtool_per_queue_op})

03:43:33 executing program 0:
syz_open_pts(0xffffffffffffff9c, 0x0)
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
fcntl$setstatus(r1, 0x4, 0x800)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e21, @multicast1}}, 0x400, 0x100, 0x20, "281789e0ac5bc42ff4dcc83b4367a56bbee8cda459fee133837c3bc3149122a8c057cd2de8ae0ede5e4e3036ce3d800a6e36c6fe8deb4a2d03262cbf3cc59b6a3cfa7e67777c556b1b0324af4905d3ea"}, 0xd8)
ioctl(r1, 0x8912, &(0x7f0000000140)="025cc83d6d345f8f760070")
ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0))
add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000280)="614479be872f779d5f28649d265b93d125f76f61d020d4bd25cd1873bd0cfbc2933d1c8fa55b1558c223518aa226ae767b22f29c3c7ff0c8621ace603ed65238600c7bc9eb6602c7de5844711ea1e0bdd42f900f316e7cbc1b4826c635aaa3f021966d4f4b8f59e967b817ed6f8ef2662ecc843808581ec99b95346b9bc5ac41930587669a2f2b20c24ca559e48ab51c41f49ace3e1b27fb18c9f9bc6c7551cd5237d4c05b3f210abf9a4547ee4d0649d222c5608a4201", 0xb7, 0xfffffffffffffffb)
add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10)
listen(0xffffffffffffffff, 0xadc)
r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0)
fcntl$getflags(r0, 0x40b)
ftruncate(r2, 0x2007fff)
ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2)
sendfile(r1, r2, &(0x7f0000000600), 0x800100000000)
fadvise64(r2, 0x0, 0x0, 0x2)
fchmod(r0, 0x80)

03:43:33 executing program 4:
keyctl$dh_compute(0xa, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}})
openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0)
socket$inet(0x2, 0xa, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321)
madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f")

03:43:33 executing program 5:
lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1)
syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)})

03:43:33 executing program 1:
pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8})
clock_gettime(0x0, &(0x7f00000005c0))
futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30)
clock_gettime(0x0, &(0x7f0000000440))
syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0)
ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64)
waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0)
setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:43:33 executing program 1:
pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8})
clock_gettime(0x0, &(0x7f00000005c0))
futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30)
clock_gettime(0x0, &(0x7f0000000440))
syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0)
ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64)
waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0)
setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:43:33 executing program 3:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

[ 2572.958961] binder: 29294:29295 Acquire 1 refcount change on invalid ref 0 ret -22
[ 2572.989873] binder: 29294:29295 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0
[ 2572.997557] binder: 29294:29295 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0
[ 2573.004781] binder: 29294:29295 BC_DEAD_BINDER_DONE 0000000000000001 not found
[ 2573.012887] binder: 29294:29295 got reply transaction with no transaction stack
[ 2573.025194] binder: 29294:29295 transaction failed 29201/-71, size 0-0 line 2762
[ 2573.034924] binder: 29294:29295 Acquire 1 refcount change on invalid ref 0 ret -22
[ 2573.042991] binder: 29294:29301 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0
[ 2573.050323] binder: 29294:29301 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0
[ 2573.057694] binder: 29294:29301 BC_DEAD_BINDER_DONE 0000000000000001 not found
[ 2573.066870] binder: undelivered TRANSACTION_ERROR: 29201
[ 2573.077553] binder: 29294:29301 got reply transaction with no transaction stack
[ 2573.085336] binder: 29294:29301 transaction failed 29201/-71, size 0-0 line 2762
[ 2573.093363] binder: undelivered TRANSACTION_ERROR: 29201
03:43:33 executing program 1:
pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8})
clock_gettime(0x0, &(0x7f00000005c0))
futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30)
clock_gettime(0x0, &(0x7f0000000440))
syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0)
ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64)
waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0)
setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:43:33 executing program 4:
openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0)
syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0)
accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14)
dup(0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28)
write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0)
fchdir(0xffffffffffffffff)
open(&(0x7f0000001640)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a)
chdir(&(0x7f0000000080)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35)
recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140))
accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
geteuid()
getegid()
getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600))
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680))
prctl$setname(0xf, &(0x7f0000001600)='^\x00')
openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0)
eventfd(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f")

03:43:33 executing program 0:
mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80)
setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00)
request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff)
add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
keyctl$setperm(0x5, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0)
getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f")
syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14)

03:43:33 executing program 5:
lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1)
syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)})

03:43:33 executing program 3:
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000002000)})
r0 = semget$private(0x0, 0x7, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r1)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000080), 0x4)
bind$inet(r2, &(0x7f00001edff0)={0x2, 0x10000004e20, @multicast1}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10)
recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f0000001a80)=@nfc_llcp, 0x80, &(0x7f00000020c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/164, 0xa4}}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002580), 0x0, &(0x7f0000001180)=""/246, 0xf6}}], 0x2ba, 0x40000002, 0x0)
sendto$inet(r2, &(0x7f0000c95ffd), 0x49b8, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10)
semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f00000001c0)=""/226)

03:43:33 executing program 2:
memfd_create(&(0x7f0000000340)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00', 0x0)
getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000380)=0x4)
ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140))
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00')
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
creat(&(0x7f0000000680)='./bus\x00', 0x0)
open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
geteuid()
lstat(&(0x7f0000000a40)='./bus\x00', &(0x7f0000000a80))
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc)
fcntl$getown(0xffffffffffffffff, 0x9)
getegid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000cc0))
geteuid()
lstat(&(0x7f0000000d00)='./bus\x00', &(0x7f0000000d40))
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0))
stat(&(0x7f0000000e00)='./bus\x00', &(0x7f0000000e40))
getgid()
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ec0))
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in6, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001000)=0xe8)
getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0))
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000001100)}, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040))
seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
fcntl$setlease(0xffffffffffffffff, 0x400, 0x0)
syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f")

03:43:33 executing program 1:
pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8})
clock_gettime(0x0, &(0x7f00000005c0))
futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0)
socket$nl_route(0x10, 0x3, 0x0)
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0)
seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)})
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x22, &(0x7f0000000340)=':wlan0securitykeyring{em1vboxnet0\x00'}, 0x30)
clock_gettime(0x0, &(0x7f0000000440))
syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0)
ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/64)
waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000004c0))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0)
setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600), 0x0)
ftruncate(0xffffffffffffffff, 0x0)
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

[ 2573.746221] binder: 29319:29324 Acquire 1 refcount change on invalid ref 0 ret -22
03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

[ 2573.804004] binder: 29319:29339 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0
03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

[ 2573.963668] binder: 29319:29324 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0
03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

[ 2574.027214] binder: 29319:29324 BC_DEAD_BINDER_DONE 0000000000000001 not found
[ 2574.046962] binder: 29319:29324 got reply transaction with no transaction stack
[ 2574.124109] binder: 29319:29324 transaction failed 29201/-71, size 0-0 line 2762
03:43:34 executing program 4:
openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0)
syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0)
accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14)
dup(0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28)
write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0)
fchdir(0xffffffffffffffff)
open(&(0x7f0000001640)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a)
chdir(&(0x7f0000000080)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35)
recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140))
accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
geteuid()
getegid()
getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600))
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680))
prctl$setname(0xf, &(0x7f0000001600)='^\x00')
openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0)
eventfd(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f")

[ 2574.263855] binder: undelivered TRANSACTION_ERROR: 29201
03:43:34 executing program 0:
mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80)
setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00)
request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff)
add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
keyctl$setperm(0x5, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0)
getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f")
syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14)

03:43:34 executing program 1:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext})

03:43:34 executing program 2:
capset(&(0x7f0000000000)={0x4000019980330}, &(0x7f0000001fe8))
r0 = socket(0x10, 0x2, 0xc)
write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f)

03:43:34 executing program 5:
lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1)
syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)})

03:43:34 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:35 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

[ 2574.634042] binder: 29369:29373 Acquire 1 refcount change on invalid ref 0 ret -22
[ 2574.695208] binder: 29369:29376 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0
[ 2574.857494] binder: 29369:29379 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0
03:43:35 executing program 4:
openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0)
syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0)
accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14)
dup(0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28)
write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0)
fchdir(0xffffffffffffffff)
open(&(0x7f0000001640)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a)
chdir(&(0x7f0000000080)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35)
recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140))
accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
geteuid()
getegid()
getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600))
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680))
prctl$setname(0xf, &(0x7f0000001600)='^\x00')
openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0)
eventfd(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f")

[ 2575.121126] binder: 29369:29379 BC_DEAD_BINDER_DONE 0000000000000001 not found
[ 2575.158676] binder: 29369:29379 got reply transaction with no transaction stack
03:43:35 executing program 2:
keyctl$setperm(0x14, 0x0, 0x0)
pipe2(&(0x7f0000000200), 0x0)
setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000240)={0x0, {{0x2, 0x0, @loopback}}}, 0x90)
getpid()
socket$inet6_udp(0xa, 0x2, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
socketpair(0x0, 0x0, 0x0, &(0x7f0000000080))
lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc)
getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0))
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[]}}, 0x0)
getgroups(0x0, &(0x7f0000001100))
fstat(0xffffffffffffffff, &(0x7f0000001140))
getgroups(0x0, &(0x7f00000011c0))
lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240))
getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340))
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000001380)={0x0, 0x0, 0x0, 0xffffffffffffff9c})
geteuid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8)
stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80))
getresuid(&(0x7f0000003b00), &(0x7f0000003b40), &(0x7f0000003b80))
lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00))
lstat(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0))
getresgid(&(0x7f0000006140), &(0x7f0000006180), 0x0)
geteuid()
fstat(0xffffffffffffffff, &(0x7f00000061c0))
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280))

[ 2575.166233] binder: 29369:29379 transaction failed 29201/-71, size 0-0 line 2762
03:43:35 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

[ 2575.536780] kauditd_printk_skb: 40 callbacks suppressed
[ 2575.536793] audit: type=1400 audit(2000000615.900:4080): avc:  denied  { map } for  pid=29390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2575.662679] audit: type=1400 audit(2000000616.030:4081): avc:  denied  { map } for  pid=29394 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:36 executing program 4:
openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0)
syz_open_dev$evdev(&(0x7f0000001740)='/dev/input/event#\x00', 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x0, 0x0)
accept$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001880)=0x14)
dup(0xffffffffffffffff)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000140))
write$input_event(0xffffffffffffffff, &(0x7f0000001440), 0x18)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28)
write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)="2e2f6367726f75702e6370752f73797a30001462e839f896840f8ffdf95c1f100b09a11d785b23c6e96f0398a8bbe20fe5b6cc73eb8db96543448f374d404ed1793f9393c2", 0x200002, 0x0)
fchdir(0xffffffffffffffff)
open(&(0x7f0000001640)='.\x00', 0x0, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/79, 0x4a)
chdir(&(0x7f0000000080)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001400), &(0x7f00000013c0)=0xfffffffffffffc35)
recvmsg(0xffffffffffffff9c, &(0x7f0000001100)={&(0x7f0000000900)=@pppol2tpv3, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/79, 0x4f}, 0x0)
ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000001140))
accept4(0xffffffffffffff9c, &(0x7f00000016c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, &(0x7f0000001240)=0xfffffd84, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8)
getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
geteuid()
getegid()
getresgid(&(0x7f0000001680), &(0x7f00000005c0), &(0x7f0000000600))
stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680))
prctl$setname(0xf, &(0x7f0000001600)='^\x00')
openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/mls\x00', 0x0, 0x0)
eventfd(0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f")

03:43:36 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

[ 2576.357473] audit: type=1400 audit(2000000616.720:4082): avc:  denied  { map } for  pid=29393 comm="syz-executor3" path="/root/syzkaller-testdir504980132/syzkaller.qDFCFH/1568/bus" dev="sda1" ino=17154 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
[ 2576.393467] binder: undelivered TRANSACTION_ERROR: 29201
[ 2576.410911] audit: type=1400 audit(2000000616.780:4083): avc:  denied  { map } for  pid=29400 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:37 executing program 4:
clock_gettime(0x4, &(0x7f0000001140))
recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10)
setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/autofs\x00', 0x0, 0x0)
dup(0xffffffffffffffff)
openat$vsock(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vsock\x00', 0x0, 0x0)
syz_open_dev$vcsn(&(0x7f0000000a00)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000980)=""/17)
accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8)
syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00')
request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd)
add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'})
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'})
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "70144461f373c9de3fbcd2d8511517a6132c49ca52f5766e7188046d66a23a1d0cf71efb7e26bfcb42a21c09940ebf684568b0857fcd4563d6e7638c2b1f27e4", "b65a6d478bb1ac13a889648b91c5db11c6a16ce22d17d490029b1a2d64c9ab70b8845545a793e430b78a4287134aa04247f14f762bdef9b0942cb31c39369e2f", "4a7f3afd9effde715ba1939252b2bf66679f9f76c9a6f93ab63f13f668799df8"})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8)
accept$packet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000740)=0x14)
gettid()
getegid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
fstat(0xffffffffffffffff, &(0x7f0000000e80))
openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0)
creat(&(0x7f0000000300)='./file0\x00', 0x0)
syz_open_dev$usb(&(0x7f0000000780)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0))
fstat(0xffffffffffffffff, &(0x7f0000000f00))
gettid()
getegid()
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700))
stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0))
fstat(0xffffffffffffffff, &(0x7f0000004340))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000043c0))
getgroups(0x0, &(0x7f0000004400))
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000046c0))
seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]})
syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f")

[ 2576.932245] audit: type=1400 audit(2000000617.280:4084): avc:  denied  { map } for  pid=29393 comm="syz-executor3" path="/root/syzkaller-testdir504980132/syzkaller.qDFCFH/1568/bus" dev="sda1" ino=17154 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
03:43:37 executing program 0:
mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80)
setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00)
request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff)
add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
keyctl$setperm(0x5, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0)
getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f")
syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14)

03:43:37 executing program 5:
lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000440)='/dev/binder#\x00', 0xd, 0x1)
syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x68, 0x0, &(0x7f0000000280)=[@clear_death={0x400c630f, 0x0, 0x2}, @dead_binder_done={0x40086310, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x3}}], 0x0, 0x0, &(0x7f0000000340)})

[ 2577.001881] audit: type=1400 audit(2000000617.370:4085): avc:  denied  { create } for  pid=29408 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2577.061926] audit: type=1400 audit(2000000617.430:4086): avc:  denied  { map } for  pid=29411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000140), 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')
sendfile(r0, r1, &(0x7f0000000000), 0x10000)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20)

[ 2577.111760] audit: type=1400 audit(2000000617.480:4087): avc:  denied  { map } for  pid=29413 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:37 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x20201)
fcntl$setstatus(r1, 0x4, 0x2800)
ioctl$TCXONC(r1, 0x540a, 0x0)
write(r1, &(0x7f0000000180)="bf", 0x1)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe)
ioctl$TCFLSH(r0, 0x540b, 0x0)

[ 2577.185144] audit: type=1400 audit(2000000617.550:4088): avc:  denied  { map } for  pid=29414 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2577.230664] binder: 29415:29416 Acquire 1 refcount change on invalid ref 0 ret -22
[ 2577.274709] audit: type=1400 audit(2000000617.640:4089): avc:  denied  { map } for  pid=29419 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2577.328340] binder: 29415:29422 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0
[ 2577.340267] binder: 29415:29416 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0
[ 2577.347501] binder: 29415:29416 BC_DEAD_BINDER_DONE 0000000000000001 not found
[ 2577.347524] binder: 29415:29416 got reply transaction with no transaction stack
[ 2577.347543] binder: 29415:29416 transaction failed 29201/-71, size 0-0 line 2762
[ 2577.360000] binder: undelivered TRANSACTION_ERROR: 29201
03:43:37 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:37 executing program 1:
keyctl$set_reqkey_keyring(0x10, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0)
socket$nl_route(0x10, 0x3, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10)
signalfd(0xffffffffffffffff, &(0x7f0000000300), 0xc9)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)
getgroups(0x0, &(0x7f0000000180))
seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)})
syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f")

03:43:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000140), 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')
sendfile(r0, r1, &(0x7f0000000000), 0x10000)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20)

03:43:37 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x20201)
fcntl$setstatus(r1, 0x4, 0x2800)
ioctl$TCXONC(r1, 0x540a, 0x0)
write(r1, &(0x7f0000000180)="bf", 0x1)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe)
ioctl$TCFLSH(r0, 0x540b, 0x0)

03:43:37 executing program 5:
clock_gettime(0xffffffffffffffff, &(0x7f0000000140))
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000140), 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')
sendfile(r0, r1, &(0x7f0000000000), 0x10000)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20)

03:43:37 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000140), 0x1c)
ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00')
sendfile(r0, r1, &(0x7f0000000000), 0x10000)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20)

03:43:38 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:38 executing program 0:
mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80)
setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00)
request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff)
add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0)
ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607)
keyctl$setperm(0x5, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0)
getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8)
setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4)
ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0))
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f")
syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00')
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002180)={0x0, @multicast2, @multicast1}, &(0x7f00000021c0)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002240)=0x14, 0x0)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000022c0)={@rand_addr, @broadcast}, &(0x7f0000002300)=0xc)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002340)={0x0, @rand_addr, @multicast1}, &(0x7f0000002380)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002640)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in6, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'yam0\x00'})
accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002940)=0x14)
getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000029c0)=0x14)

03:43:38 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x20201)
fcntl$setstatus(r1, 0x4, 0x2800)
ioctl$TCXONC(r1, 0x540a, 0x0)
write(r1, &(0x7f0000000180)="bf", 0x1)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe)
ioctl$TCFLSH(r0, 0x540b, 0x0)

03:43:38 executing program 1:
rt_sigpending(&(0x7f0000000680), 0x1b3)
syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00'}, 0x35a)
semget$private(0x0, 0x0, 0x0)
syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0)
lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0)
getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98)
getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10)
semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680})
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f")
getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0)
fcntl$addseals(0xffffffffffffffff, 0x409, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]})
syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e")
ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000480))
ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000004c0))
ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000500))
setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), 0x8)
accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80)
setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000540), 0x4)

03:43:38 executing program 1:
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0)
mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280))
rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8)
times(&(0x7f0000000640))
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700))
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703")
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc)
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0))
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:43:40 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:40 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:40 executing program 5:
clock_gettime(0xffffffffffffffff, &(0x7f0000000140))
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:40 executing program 1:
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0)
mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280))
rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8)
times(&(0x7f0000000640))
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700))
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703")
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc)
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0))
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:43:40 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc))
r1 = syz_open_pts(r0, 0x20201)
fcntl$setstatus(r1, 0x4, 0x2800)
ioctl$TCXONC(r1, 0x540a, 0x0)
write(r1, &(0x7f0000000180)="bf", 0x1)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe)
ioctl$TCFLSH(r0, 0x540b, 0x0)

03:43:40 executing program 1:
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0)
mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280))
rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8)
times(&(0x7f0000000640))
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700))
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703")
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc)
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0))
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5)
seccomp(0x0, 0x0, &(0x7f0000000100))

03:43:40 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

[ 2580.646607] kauditd_printk_skb: 21 callbacks suppressed
[ 2580.646624] audit: type=1400 audit(2000000621.010:4111): avc:  denied  { map } for  pid=29484 comm="syz-executor4" path="/root/syzkaller-testdir207369078/syzkaller.l5X3vG/3336/bus" dev="sda1" ino=17151 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0
[ 2581.000107] audit: type=1400 audit(2000000621.370:4112): avc:  denied  { map } for  pid=29488 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:41 executing program 1:
futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000000a00)="ea7b00", 0x0)
mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280))
rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00')
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffdbc)
syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@loopback}, &(0x7f00000007c0)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8)
times(&(0x7f0000000640))
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700))
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703")
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'})
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @dev, @multicast1}, &(0x7f0000000d40)=0xc)
ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0))
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5)
seccomp(0x0, 0x0, &(0x7f0000000100))

[ 2581.399558] audit: type=1400 audit(2000000621.770:4113): avc:  denied  { map } for  pid=29489 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2581.445028] audit: type=1400 audit(2000000621.800:4114): avc:  denied  { create } for  pid=29490 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:41 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0)
write$cgroup_int(r1, &(0x7f0000000380), 0x10076)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0})

03:43:41 executing program 4:
keyctl$setperm(0x8, 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380))
perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240))
syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32)
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14)

03:43:41 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0))
open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
dup(0xffffffffffffffff)
perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640))
stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800))
lstat(&(0x7f0000001b80)='./file1\x00', &(0x7f0000001bc0))
getpgrp(0x0)
getpid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000003140)=0xe8)
stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0))
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003280)={&(0x7f0000000400)=@proc, 0xc, &(0x7f0000002fc0), 0x0, &(0x7f0000003240)}, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@loopback}, 0x9a)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]})
fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000000c0)='trusted.overlay.upper\x00', 0xffffffffffffff9c}, 0x10)
syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")

[ 2581.612944] audit: type=1400 audit(2000000621.980:4115): avc:  denied  { map } for  pid=29493 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2581.695807] audit: type=1400 audit(2000000622.060:4116): avc:  denied  { map } for  pid=29496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2581.914599] audit: type=1400 audit(2000000622.280:4117): avc:  denied  { create } for  pid=29494 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:42 executing program 1:
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
clock_gettime(0x0, &(0x7f0000000080))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[])
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340))
ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194)
syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080))
syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00')
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0))
getpgid(0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0)

[ 2582.364674] audit: type=1400 audit(2000000622.730:4118): avc:  denied  { map } for  pid=29499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2582.519783] audit: type=1400 audit(2000000622.890:4119): avc:  denied  { create } for  pid=29500 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
[ 2582.550276] audit: type=1400 audit(2000000622.920:4120): avc:  denied  { create } for  pid=29500 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0
03:43:43 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x2})
ftruncate(r0, 0x8200)
r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000240)=@srh, 0x8)
get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x4, &(0x7f0000004000/0x3000)=nil, 0x0)
syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x101, 0x41)
sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x900)

03:43:43 executing program 4:
keyctl$setperm(0x8, 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380))
perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240))
syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32)
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14)

03:43:43 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0)
write$cgroup_int(r1, &(0x7f0000000380), 0x10076)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0})

03:43:43 executing program 5:
clock_gettime(0xffffffffffffffff, &(0x7f0000000140))
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")

03:43:43 executing program 1:
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
clock_gettime(0x0, &(0x7f0000000080))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[])
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340))
ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194)
syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080))
syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00')
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0))
getpgid(0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0)

03:43:44 executing program 1:
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
clock_gettime(0x0, &(0x7f0000000080))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[])
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340))
ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194)
syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080))
syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00')
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0))
getpgid(0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0)

03:43:44 executing program 4:
keyctl$setperm(0x8, 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380))
perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240))
syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32)
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14)

03:43:45 executing program 1:
futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0)
clock_gettime(0x0, &(0x7f0000000080))
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000300)=ANY=[])
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340))
ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000480)=""/194)
syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55")
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0)
socket$netlink(0x10, 0x3, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080))
syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00')
sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[]}}, 0x0)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0))
getpgid(0x0)
waitid(0x0, 0x0, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00')
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}}}, &(0x7f0000000680)=0xe8)
accept4$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast1, @multicast2}, &(0x7f0000000b80)=0xc)
accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c40)={@ipv4}, &(0x7f0000000c80)=0x14)
accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14, 0x0)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @local, @multicast1}, &(0x7f0000000dc0)=0xc)
accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c80)={{{@in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003d80)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @remote}, &(0x7f0000004740)=0xc)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast1, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004980)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={'vcan0\x00'})
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'bridge_slave_1\x00'})
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000090c0)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000091c0)=0xe8)
recvmmsg(0xffffffffffffffff, &(0x7f000000ac00), 0x0, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ad80)={'team0\x00'})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ae80)={@mcast1}, &(0x7f000000aec0)=0x14)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d5c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f000000d6c0)=0xe8)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d700)={'team0\x00'})
accept4(0xffffffffffffffff, &(0x7f000000d740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d7c0)=0x80, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dcc0)={{{@in, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000ddc0)=0xe8)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000de00)={'ip6gre0\x00'})
accept4$packet(0xffffffffffffffff, &(0x7f000000de80), &(0x7f000000dec0)=0x14, 0x0)

03:43:45 executing program 4:
keyctl$setperm(0x8, 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380))
perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0)
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0)
ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000240))
syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
connect$l2tp(0xffffffffffffffff, &(0x7f0000000a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32)
syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e")
write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0)
setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4)
syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00')
getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14)

03:43:45 executing program 0:
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000001c0)=@req3={0xe1f, 0x0, 0x3}, 0x9ed27b770768daeb)
r1 = socket$netlink(0x10, 0x3, 0x4)
sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0)

03:43:46 executing program 1:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
r1 = dup(r0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000000), 0x1c9)
r2 = open(&(0x7f0000002000)='./bus\x00', 0x100000141042, 0x0)
ftruncate(r2, 0x10099b8)
sendfile(r0, r2, &(0x7f0000d83ff8), 0x8000fffffffe)

03:43:46 executing program 4:
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000001c0))
memfd_create(&(0x7f00000008c0)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
fcntl$getflags(0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000340))
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]})
syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f")
getpid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc)
mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000700)=""/252)
getgroups(0x0, &(0x7f0000000340))
lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0))
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc)
kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0))
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000280), 0x0, &(0x7f00000004c0)}, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140))
write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000080)={0xb}, 0xb)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78)
fgetxattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'btrfs.', 'GPL\x00'}, &(0x7f00000005c0)=""/225, 0xe1)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0x0, 0x1a0, 0x1a0, 0x0, 0xd0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x3b0, 0x5, &(0x7f00000004c0), {[{{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @rand_addr, @multicast2, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast2, @local, @gre_key, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @empty, @rand_addr, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x448)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000006c0))
pipe2$9p(&(0x7f0000000240), 0x0)

[ 2586.024379] kauditd_printk_skb: 17 callbacks suppressed
[ 2586.024394] audit: type=1400 audit(2000000626.390:4138): avc:  denied  { map } for  pid=29549 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
03:43:46 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0)
write$cgroup_int(r1, &(0x7f0000000380), 0x10076)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0})

03:43:46 executing program 3:
r0 = socket(0x10, 0x802, 0x0)
write(r0, &(0x7f0000000000)="2400000020002553075f0165ff72fc2281000000001000220ee1000c08000f0000001700", 0x24)

[ 2586.211660] audit: type=1400 audit(2000000626.580:4139): avc:  denied  { map } for  pid=29555 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2586.284207] audit: type=1400 audit(2000000626.650:4140): avc:  denied  { map } for  pid=29556 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0
[ 2586.783299] ==================================================================
[ 2586.790946] BUG: KASAN: use-after-free in sock_i_ino+0x94/0xa0
[ 2586.796925] Read of size 8 at addr ffff8801701e7ab0 by task syz-executor0/29559
[ 2586.804365] 
[ 2586.805999] CPU: 1 PID: 29559 Comm: syz-executor0 Not tainted 4.19.0-rc3+ #12
[ 2586.813275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 2586.822625] Call Trace:
[ 2586.825265]  dump_stack+0x1c4/0x2b4
[ 2586.828906]  ? dump_stack_print_info.cold.2+0x52/0x52
[ 2586.834109]  ? printk+0xa7/0xcf
[ 2586.837394]  ? kmsg_dump_rewind_nolock+0xe4/0xe4
[ 2586.842159]  print_address_description.cold.8+0x9/0x1ff
[ 2586.847523]  kasan_report.cold.9+0x242/0x309
[ 2586.851929]  ? sock_i_ino+0x94/0xa0
[ 2586.855561]  __asan_report_load8_noabort+0x14/0x20
[ 2586.860493]  sock_i_ino+0x94/0xa0
[ 2586.864061]  tipc_sk_fill_sock_diag+0x39c/0xd90
[ 2586.868745]  ? tipc_diag_dump+0x30/0x30
[ 2586.872723]  ? tipc_getname+0x7f0/0x7f0
[ 2586.876708]  ? graph_lock+0x170/0x170
[ 2586.880588]  ? __lock_sock+0x203/0x350
[ 2586.884494]  ? find_held_lock+0x36/0x1c0
[ 2586.888559]  ? mark_held_locks+0xc7/0x130
[ 2586.892712]  ? __local_bh_enable_ip+0x160/0x260
[ 2586.897385]  ? __local_bh_enable_ip+0x160/0x260
[ 2586.902068]  ? lockdep_hardirqs_on+0x421/0x5c0
[ 2586.906673]  ? trace_hardirqs_on+0xbd/0x310
[ 2586.911000]  ? lock_release+0x970/0x970
[ 2586.914978]  ? lock_sock_nested+0xe2/0x120
[ 2586.919220]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 2586.924241]  ? skb_put+0x17b/0x1e0
[ 2586.927780]  ? memset+0x31/0x40
[ 2586.931121]  ? __nlmsg_put+0x14c/0x1b0
[ 2586.935022]  __tipc_add_sock_diag+0x233/0x360
[ 2586.939524]  tipc_nl_sk_walk+0x122/0x1d0
[ 2586.943585]  ? tipc_sock_diag_handler_dump+0x3d0/0x3d0
[ 2586.948873]  tipc_diag_dump+0x24/0x30
[ 2586.952682]  netlink_dump+0x519/0xd50
[ 2586.956488]  ? netlink_broadcast+0x50/0x50
[ 2586.960733]  __netlink_dump_start+0x4f1/0x6f0
[ 2586.965234]  ? tipc_data_ready+0x3e0/0x3e0
[ 2586.969479]  tipc_sock_diag_handler_dump+0x28e/0x3d0
[ 2586.974590]  ? __tipc_diag_gen_cookie+0xc0/0xc0
[ 2586.979263]  ? tipc_data_ready+0x3e0/0x3e0
[ 2586.983497]  ? tipc_unregister_sysctl+0x20/0x20
[ 2586.988163]  ? tipc_ioctl+0x3a0/0x3a0
[ 2586.991968]  ? netlink_deliver_tap+0x355/0xf80
[ 2586.996641]  sock_diag_rcv_msg+0x31d/0x410
[ 2587.000884]  netlink_rcv_skb+0x172/0x440
[ 2587.004946]  ? sock_diag_bind+0x80/0x80
[ 2587.008920]  ? netlink_ack+0xb80/0xb80
[ 2587.012818]  sock_diag_rcv+0x2a/0x40
[ 2587.016537]  netlink_unicast+0x5a5/0x760
[ 2587.020614]  ? netlink_attachskb+0x9a0/0x9a0
[ 2587.025029]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.030572]  netlink_sendmsg+0xa18/0xfc0
[ 2587.034648]  ? netlink_unicast+0x760/0x760
[ 2587.038895]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.044431]  ? security_socket_sendmsg+0x94/0xc0
[ 2587.049190]  ? netlink_unicast+0x760/0x760
[ 2587.053426]  sock_sendmsg+0xd5/0x120
[ 2587.057143]  ___sys_sendmsg+0x7fd/0x930
[ 2587.061125]  ? __local_bh_enable_ip+0x160/0x260
[ 2587.065799]  ? copy_msghdr_from_user+0x580/0x580
[ 2587.070556]  ? kasan_check_write+0x14/0x20
[ 2587.074904]  ? _raw_spin_unlock_bh+0x30/0x40
[ 2587.079318]  ? __bpf_trace_preemptirq_template+0x30/0x30
[ 2587.084773]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.090311]  ? release_sock+0x1ec/0x2c0
[ 2587.094291]  ? __fget_light+0x2e9/0x430
[ 2587.098712]  ? fget_raw+0x20/0x20
[ 2587.102165]  ? __release_sock+0x3a0/0x3a0
[ 2587.106318]  ? tipc_nametbl_build_group+0x273/0x360
[ 2587.111337]  ? tipc_setsockopt+0x726/0xd70
[ 2587.115597]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 2587.121143]  ? sockfd_lookup_light+0xc5/0x160
[ 2587.125640]  __sys_sendmsg+0x11d/0x280
[ 2587.129530]  ? __ia32_sys_shutdown+0x80/0x80
[ 2587.133938]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[ 2587.139479]  ? fput+0x130/0x1a0
[ 2587.142767]  ? __x64_sys_futex+0x47f/0x6a0
[ 2587.147003]  ? do_syscall_64+0x9a/0x820
[ 2587.150975]  ? do_syscall_64+0x9a/0x820
[ 2587.154957]  ? __bpf_trace_preemptirq_template+0x30/0x30
[ 2587.160413]  __x64_sys_sendmsg+0x78/0xb0
[ 2587.164479]  do_syscall_64+0x1b9/0x820
[ 2587.168368]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[ 2587.173736]  ? syscall_return_slowpath+0x5e0/0x5e0
[ 2587.178671]  ? trace_hardirqs_on_caller+0x310/0x310
[ 2587.183688]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[ 2587.188700]  ? recalc_sigpending_tsk+0x180/0x180
[ 2587.193464]  ? kasan_check_write+0x14/0x20
[ 2587.197707]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[ 2587.202564]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 2587.207761] RIP: 0033:0x4572d9
[ 2587.210958] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 2587.229863] RSP: 002b:00007f4e81d9ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 2587.237575] RAX: ffffffffffffffda RBX: 00007f4e81d9f6d4 RCX: 00000000004572d9
[ 2587.244849] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006
[ 2587.252116] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000
[ 2587.259381] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[ 2587.266647] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000
[ 2587.273927] 
[ 2587.275553] Allocated by task 29559:
[ 2587.279268]  save_stack+0x43/0xd0
[ 2587.282717]  kasan_kmalloc+0xc7/0xe0
[ 2587.286427]  kasan_slab_alloc+0x12/0x20
[ 2587.290401]  kmem_cache_alloc+0x12e/0x730
[ 2587.294547]  sock_alloc_inode+0x1d/0x260
[ 2587.298612]  alloc_inode+0x63/0x190
[ 2587.302239]  new_inode_pseudo+0x71/0x1a0
[ 2587.306294]  sock_alloc+0x41/0x270
[ 2587.309829]  __sock_create+0x175/0x930
[ 2587.313711]  __sys_socket+0x106/0x260
[ 2587.317508]  __x64_sys_socket+0x73/0xb0
[ 2587.321481]  do_syscall_64+0x1b9/0x820
[ 2587.325367]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 2587.330545] 
[ 2587.332169] Freed by task 29557:
[ 2587.335532]  save_stack+0x43/0xd0
[ 2587.338981]  __kasan_slab_free+0x102/0x150
[ 2587.343213]  kasan_slab_free+0xe/0x10
[ 2587.347012]  kmem_cache_free+0x83/0x290
[ 2587.350983]  sock_destroy_inode+0x51/0x60
[ 2587.355128]  destroy_inode+0x159/0x200
[ 2587.359011]  evict+0x5e0/0x980
[ 2587.362198]  iput+0x679/0xa90
[ 2587.365312]  dentry_unlink_inode+0x461/0x5e0
[ 2587.369719]  __dentry_kill+0x44c/0x7a0
[ 2587.373613]  dentry_kill+0xc9/0x5a0
[ 2587.377238]  dput.part.26+0x660/0x790
[ 2587.381035]  dput+0x15/0x20
[ 2587.383996]  __fput+0x4cf/0xa30
[ 2587.387267]  ____fput+0x15/0x20
[ 2587.390541]  task_work_run+0x1e8/0x2a0
[ 2587.394425]  exit_to_usermode_loop+0x318/0x380
[ 2587.399005]  do_syscall_64+0x6be/0x820
[ 2587.402892]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 2587.408067] 
[ 2587.409700] The buggy address belongs to the object at ffff8801701e7a40
[ 2587.409700]  which belongs to the cache sock_inode_cache of size 984
[ 2587.422786] The buggy address is located 112 bytes inside of
[ 2587.422786]  984-byte region [ffff8801701e7a40, ffff8801701e7e18)
[ 2587.434656] The buggy address belongs to the page:
[ 2587.439583] page:ffffea0005c079c0 count:1 mapcount:0 mapping:ffff8801d9bfe3c0 index:0xffff8801701e7ffd
[ 2587.449030] flags: 0x2fffc0000000100(slab)
[ 2587.453264] raw: 02fffc0000000100 ffffea0005c12c88 ffffea0006e61008 ffff8801d9bfe3c0
[ 2587.461146] raw: ffff8801701e7ffd ffff8801701e7140 0000000100000002 0000000000000000
[ 2587.469013] page dumped because: kasan: bad access detected
[ 2587.474709] 
[ 2587.476324] Memory state around the buggy address:
[ 2587.481247]  ffff8801701e7980: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 2587.488603]  ffff8801701e7a00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[ 2587.495966] >ffff8801701e7a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2587.503319]                                      ^
[ 2587.508241]  ffff8801701e7b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2587.515593]  ffff8801701e7b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2587.522943] ==================================================================
[ 2587.530289] Disabling lock debugging due to kernel taint
[ 2587.535821] Kernel panic - not syncing: panic_on_warn set ...
[ 2587.535821] 
[ 2587.543189] CPU: 1 PID: 29559 Comm: syz-executor0 Tainted: G    B             4.19.0-rc3+ #12
[ 2587.551928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 2587.561273] Call Trace:
[ 2587.563864]  dump_stack+0x1c4/0x2b4
[ 2587.567510]  ? dump_stack_print_info.cold.2+0x52/0x52
[ 2587.572701]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 2587.577457]  panic+0x238/0x4e7
[ 2587.580646]  ? add_taint.cold.5+0x16/0x16
[ 2587.584795]  ? trace_hardirqs_on+0xb4/0x310
[ 2587.589116]  ? trace_hardirqs_on+0xb4/0x310
[ 2587.593442]  kasan_end_report+0x47/0x4f
[ 2587.597415]  kasan_report.cold.9+0x76/0x309
[ 2587.601731]  ? sock_i_ino+0x94/0xa0
[ 2587.605353]  __asan_report_load8_noabort+0x14/0x20
[ 2587.610277]  sock_i_ino+0x94/0xa0
[ 2587.613733]  tipc_sk_fill_sock_diag+0x39c/0xd90
[ 2587.618403]  ? tipc_diag_dump+0x30/0x30
[ 2587.622375]  ? tipc_getname+0x7f0/0x7f0
[ 2587.626354]  ? graph_lock+0x170/0x170
[ 2587.630153]  ? __lock_sock+0x203/0x350
[ 2587.634037]  ? find_held_lock+0x36/0x1c0
[ 2587.638103]  ? mark_held_locks+0xc7/0x130
[ 2587.642250]  ? __local_bh_enable_ip+0x160/0x260
[ 2587.646913]  ? __local_bh_enable_ip+0x160/0x260
[ 2587.651578]  ? lockdep_hardirqs_on+0x421/0x5c0
[ 2587.656160]  ? trace_hardirqs_on+0xbd/0x310
[ 2587.660473]  ? lock_release+0x970/0x970
[ 2587.664442]  ? lock_sock_nested+0xe2/0x120
[ 2587.668676]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[ 2587.673683]  ? skb_put+0x17b/0x1e0
[ 2587.677217]  ? memset+0x31/0x40
[ 2587.680495]  ? __nlmsg_put+0x14c/0x1b0
[ 2587.684399]  __tipc_add_sock_diag+0x233/0x360
[ 2587.688891]  tipc_nl_sk_walk+0x122/0x1d0
[ 2587.692948]  ? tipc_sock_diag_handler_dump+0x3d0/0x3d0
[ 2587.698216]  tipc_diag_dump+0x24/0x30
[ 2587.702012]  netlink_dump+0x519/0xd50
[ 2587.705813]  ? netlink_broadcast+0x50/0x50
[ 2587.710054]  __netlink_dump_start+0x4f1/0x6f0
[ 2587.714551]  ? tipc_data_ready+0x3e0/0x3e0
[ 2587.718782]  tipc_sock_diag_handler_dump+0x28e/0x3d0
[ 2587.723883]  ? __tipc_diag_gen_cookie+0xc0/0xc0
[ 2587.728553]  ? tipc_data_ready+0x3e0/0x3e0
[ 2587.732781]  ? tipc_unregister_sysctl+0x20/0x20
[ 2587.737442]  ? tipc_ioctl+0x3a0/0x3a0
[ 2587.741237]  ? netlink_deliver_tap+0x355/0xf80
[ 2587.745818]  sock_diag_rcv_msg+0x31d/0x410
[ 2587.750049]  netlink_rcv_skb+0x172/0x440
[ 2587.754110]  ? sock_diag_bind+0x80/0x80
[ 2587.758081]  ? netlink_ack+0xb80/0xb80
[ 2587.761980]  sock_diag_rcv+0x2a/0x40
[ 2587.765691]  netlink_unicast+0x5a5/0x760
[ 2587.769752]  ? netlink_attachskb+0x9a0/0x9a0
[ 2587.774157]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.779693]  netlink_sendmsg+0xa18/0xfc0
[ 2587.783753]  ? netlink_unicast+0x760/0x760
[ 2587.787992]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.793530]  ? security_socket_sendmsg+0x94/0xc0
[ 2587.798288]  ? netlink_unicast+0x760/0x760
[ 2587.802521]  sock_sendmsg+0xd5/0x120
[ 2587.806235]  ___sys_sendmsg+0x7fd/0x930
[ 2587.810207]  ? __local_bh_enable_ip+0x160/0x260
[ 2587.814872]  ? copy_msghdr_from_user+0x580/0x580
[ 2587.819629]  ? kasan_check_write+0x14/0x20
[ 2587.823858]  ? _raw_spin_unlock_bh+0x30/0x40
[ 2587.828268]  ? __bpf_trace_preemptirq_template+0x30/0x30
[ 2587.833716]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 2587.839252]  ? release_sock+0x1ec/0x2c0
[ 2587.843225]  ? __fget_light+0x2e9/0x430
[ 2587.847192]  ? fget_raw+0x20/0x20
[ 2587.850640]  ? __release_sock+0x3a0/0x3a0
[ 2587.854784]  ? tipc_nametbl_build_group+0x273/0x360
[ 2587.859801]  ? tipc_setsockopt+0x726/0xd70
[ 2587.864037]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 2587.869567]  ? sockfd_lookup_light+0xc5/0x160
[ 2587.874061]  __sys_sendmsg+0x11d/0x280
[ 2587.877956]  ? __ia32_sys_shutdown+0x80/0x80
[ 2587.882362]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[ 2587.887900]  ? fput+0x130/0x1a0
[ 2587.891187]  ? __x64_sys_futex+0x47f/0x6a0
[ 2587.895417]  ? do_syscall_64+0x9a/0x820
[ 2587.899388]  ? do_syscall_64+0x9a/0x820
[ 2587.903367]  ? __bpf_trace_preemptirq_template+0x30/0x30
[ 2587.908816]  __x64_sys_sendmsg+0x78/0xb0
[ 2587.912877]  do_syscall_64+0x1b9/0x820
[ 2587.916769]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[ 2587.922130]  ? syscall_return_slowpath+0x5e0/0x5e0
[ 2587.927055]  ? trace_hardirqs_on_caller+0x310/0x310
[ 2587.932074]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[ 2587.937103]  ? recalc_sigpending_tsk+0x180/0x180
[ 2587.941858]  ? kasan_check_write+0x14/0x20
[ 2587.946105]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[ 2587.950952]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 2587.956133] RIP: 0033:0x4572d9
[ 2587.959325] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 2587.978476] RSP: 002b:00007f4e81d9ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 2587.986177] RAX: ffffffffffffffda RBX: 00007f4e81d9f6d4 RCX: 00000000004572d9
[ 2587.993438] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006
[ 2588.000698] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000
[ 2588.007987] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
[ 2588.015247] R13: 00000000004d4f40 R14: 00000000004c941e R15: 0000000000000000
[ 2588.023588] Kernel Offset: disabled
[ 2588.027219] Rebooting in 86400 seconds..