01811.410:229768): avc: denied { map } for pid=5660 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.651902] audit: type=1400 audit(1574201811.420:229769): avc: denied { map } for pid=5660 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.676500] audit: type=1400 audit(1574201811.420:229770): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.700820] audit: type=1400 audit(1574201811.420:229771): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.727365] audit: type=1400 audit(1574201811.430:229772): avc: denied { map } for pid=5660 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.750285] audit: type=1400 audit(1574201811.430:229773): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.777390] audit: type=1400 audit(1574201811.430:229774): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.802354] audit: type=1400 audit(1574201811.440:229775): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.829299] audit: type=1400 audit(1574201811.440:229776): avc: denied { map } for pid=5660 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1549.854003] audit: type=1400 audit(1574201811.480:229777): avc: denied { map } for pid=5661 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:16:55 executing program 4: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) close(0xffffffffffffffff) close(0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x4f126d817891da9c}, 0xc) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x208203) sendfile(r0, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') 22:16:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a", 0x5a, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:16:55 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) mount(&(0x7f0000000680)=ANY=[], 0x0, &(0x7f0000000380)='hfsplus\x00', 0x0, &(0x7f0000000740)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05') r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) write(r0, &(0x7f0000000cc0)="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", 0x1000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, 0x0, &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0xfffffffffffffff8) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100026}, 0xc, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="ac0200001200010028bd70000000000000000000", @ANYRES32=r5, @ANYBLOB="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"], 0x2ac}}, 0x20040010) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x102) dup2(r6, r7) sendfile(r2, r3, &(0x7f00000001c0), 0x20002000005) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000c80)={'veth1_to_hsr\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB]}) ioctl$LOOP_CLR_FD(r3, 0x4c01) connect$inet(0xffffffffffffffff, &(0x7f00000000c0), 0x10) 22:16:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = gettid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0xf, &(0x7f0000000080)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ptrace(0x10, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffff, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x100000) fallocate(r2, 0x0, 0x80, 0x9942) keyctl$get_security(0x11, 0x0, &(0x7f00000002c0)=""/182, 0xb6) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) wait4(r3, 0x0, 0x20000000, 0x0) pipe(&(0x7f0000001fc0)) r4 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc0045878, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file1\x00', 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000003c0)) times(&(0x7f00000001c0)) 22:16:55 executing program 3: r0 = socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) getsockname(r0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000400)=ANY=[]) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000a, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) fcntl$dupfd(r1, 0x0, r1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0xfffffffc}, 0xfffffffffffffed5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) fcntl$dupfd(r2, 0x0, r2) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, r3, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10001, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:16:55 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000000)={0x200000000000000}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x108) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x21901108}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x10, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) 22:16:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = eventfd2(0x7fff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xd3) r2 = socket$netlink(0x10, 0x3, 0x1c) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) ioctl$FICLONE(r0, 0x40049409, r3) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='user.syz\x00', &(0x7f0000000400)='\'.\x00', 0x3, 0xb5ae3cd656c4fbc3) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f00000001c0)="1a84ebabdbab56cdaee4") epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) fallocate(r5, 0x11, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000240)={0xa, 0x2, 0x8001}) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401, 0x0, 0x5d0bfafba03053ce, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x10, 0x80000, 0x4, &(0x7f0000000200)) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1554.630968] kauditd_printk_skb: 631 callbacks suppressed [ 1554.630975] audit: type=1400 audit(1574201816.412:230409): avc: denied { map } for pid=5754 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:16:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x80) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e23, 0x5, @ipv4={[], [], @rand_addr=0x7}, 0x7}, 0xfffffffffffffe13) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r3, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f0000000200)=""/133, &(0x7f00000000c0)=0x85) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) creat(&(0x7f0000000000)='./bus\x00', 0x270) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x4c700, 0x0) ftruncate(r6, 0x6cb1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r5, 0x80006) sendfile(r1, r5, 0x0, 0x8000fffffffe) dup3(r0, r1, 0x0) clone(0x24001000, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1554.723225] : renamed from ip_vti0 [ 1554.798419] audit: type=1400 audit(1574201816.432:230410): avc: denied { map } for pid=5754 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:16:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be", 0x60, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:16:56 executing program 5: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @empty}}, 0x5c) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x2b) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x17, 0x2, 0x4, 0x8, 0x11, 0x5, 0xa3, 0x7f, 0xe033, 0xa9a5, 0x8}) io_setup(0x24, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f00000000c0)={0x2c, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0x354}]) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c) [ 1554.982430] audit: type=1400 audit(1574201816.432:230411): avc: denied { map } for pid=5754 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:16:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be", 0x60, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1555.097977] audit: type=1400 audit(1574201816.452:230412): avc: denied { map } for pid=5757 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.243876] audit: type=1400 audit(1574201816.462:230413): avc: denied { map } for pid=5750 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.402230] audit: type=1400 audit(1574201816.462:230414): avc: denied { map } for pid=5750 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.569654] audit: type=1400 audit(1574201816.492:230415): avc: denied { map } for pid=5757 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.772102] audit: type=1400 audit(1574201816.492:230416): avc: denied { map } for pid=5757 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:16:57 executing program 5: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) prlimit64(0x0, 0x3, &(0x7f0000000280)={0x7ff, 0x8d}, 0x0) getpid() r0 = gettid() sched_setattr(r0, &(0x7f0000000040)={0x4, 0x6, 0x1, 0x7fffffff, 0x9, 0x80000000000004, 0x0, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x44}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000080)="525da242f1a358ff5338e2409cdaaec5ef01dc9f5e677a58ecf830c052686b00ae64f5a8dcf0e41a3385e8", 0x3cd11987) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000000)='y\x00', 0x2b765f310ec77084, 0xc07594a88faa500a) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') pipe(0x0) creat(0x0, 0xe8) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000500)='/selinux/poli\xec\x13\rA\x9e\xd7j\x8e\xcbo\xccb\xf0@^\x86t$\x87\x10]\xf3\x9d\x81\xda\x03R\x9b{\xf4\t\xaa\x83\xfa/\xfb{\xc5{\x01~\xe0,hhw\xdd\xd0\x83\xc7\x13\xb9\xf3G\x00'/80) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x581400, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8100001}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x30, 0x0, 0x1, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x83, 0x100, 0x40000000}}}}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x0) write$binfmt_script(r3, 0x0, 0x0) getpid() ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000000c0)={0x0, 0x0}) vmsplice(r2, 0x0, 0x0, 0x1) socket$inet6(0xa, 0x0, 0x0) [ 1555.931533] audit: type=1400 audit(1574201816.562:230417): avc: denied { map } for pid=5757 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1555.993054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1559.633721] kauditd_printk_skb: 334 callbacks suppressed [ 1559.633730] audit: type=1400 audit(1574201821.425:230723): avc: denied { map } for pid=5822 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.665648] audit: type=1400 audit(1574201821.445:230724): avc: denied { map } for pid=5822 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.698875] audit: type=1400 audit(1574201821.455:230725): avc: denied { map } for pid=5822 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.723811] audit: type=1400 audit(1574201821.455:230726): avc: denied { map } for pid=5822 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.753467] audit: type=1400 audit(1574201821.485:230727): avc: denied { map } for pid=5823 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.775904] audit: type=1400 audit(1574201821.485:230728): avc: denied { map } for pid=5823 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.801856] audit: type=1400 audit(1574201821.485:230729): avc: denied { map } for pid=5823 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.834846] audit: type=1400 audit(1574201821.515:230730): avc: denied { map } for pid=5823 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.865660] audit: type=1400 audit(1574201821.515:230731): avc: denied { map } for pid=5823 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1559.889491] audit: type=1400 audit(1574201821.545:230732): avc: denied { map } for pid=5823 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.639817] kauditd_printk_skb: 1102 callbacks suppressed [ 1564.639827] audit: type=1400 audit(1574201826.437:231835): avc: denied { map } for pid=5947 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.698071] audit: type=1400 audit(1574201826.437:231836): avc: denied { map } for pid=5948 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.757677] audit: type=1400 audit(1574201826.437:231837): avc: denied { map } for pid=5948 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.797711] audit: type=1400 audit(1574201826.467:231838): avc: denied { map } for pid=5948 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.822214] audit: type=1400 audit(1574201826.467:231839): avc: denied { map } for pid=5948 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.867561] audit: type=1400 audit(1574201826.467:231840): avc: denied { map } for pid=5947 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.900278] audit: type=1400 audit(1574201826.477:231841): avc: denied { map } for pid=5948 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.926927] audit: type=1400 audit(1574201826.477:231842): avc: denied { map } for pid=5947 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.954273] audit: type=1400 audit(1574201826.477:231843): avc: denied { map } for pid=5947 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1564.978929] audit: type=1400 audit(1574201826.477:231844): avc: denied { map } for pid=5948 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.664960] kauditd_printk_skb: 1110 callbacks suppressed [ 1569.664970] audit: type=1400 audit(1574201831.460:232955): avc: denied { map } for pid=6074 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.725120] audit: type=1400 audit(1574201831.480:232956): avc: denied { map } for pid=6075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.775148] audit: type=1400 audit(1574201831.480:232957): avc: denied { map } for pid=6075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.808930] audit: type=1400 audit(1574201831.480:232958): avc: denied { map } for pid=6075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.842123] audit: type=1400 audit(1574201831.480:232959): avc: denied { map } for pid=6075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.866728] audit: type=1400 audit(1574201831.490:232960): avc: denied { map } for pid=6075 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.907749] audit: type=1400 audit(1574201831.490:232961): avc: denied { map } for pid=6075 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.939390] audit: type=1400 audit(1574201831.490:232962): avc: denied { map } for pid=6074 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1569.984968] audit: type=1400 audit(1574201831.500:232963): avc: denied { map } for pid=6075 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1570.010620] audit: type=1400 audit(1574201831.500:232964): avc: denied { map } for pid=6074 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.668516] kauditd_printk_skb: 1131 callbacks suppressed [ 1574.668525] audit: type=1400 audit(1574201836.462:234097): avc: denied { map } for pid=6204 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.732668] audit: type=1400 audit(1574201836.462:234096): avc: denied { map } for pid=6205 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.782582] audit: type=1400 audit(1574201836.462:234098): avc: denied { map } for pid=6204 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.807099] audit: type=1400 audit(1574201836.462:234099): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.853418] audit: type=1400 audit(1574201836.472:234100): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.902591] audit: type=1400 audit(1574201836.472:234101): avc: denied { map } for pid=6204 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.925558] audit: type=1400 audit(1574201836.472:234102): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1574.973937] audit: type=1400 audit(1574201836.472:234103): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1575.009057] audit: type=1400 audit(1574201836.472:234104): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1575.062414] audit: type=1400 audit(1574201836.502:234105): avc: denied { map } for pid=6204 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:17:21 executing program 2: perf_event_open(&(0x7f0000000400)={0x4, 0x22, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xab854ca10cf8bcf9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x3c, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) shutdown(r0, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4f23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r5]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r7]) getgroups(0x3, &(0x7f0000000280)=[r5, r7, 0xffffffffffffffff]) lchown(&(0x7f0000000240)='./file0\x00', r3, r8) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c80, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) 22:17:21 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = socket$inet(0x2, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x201, 0x170) r5 = accept4$unix(r3, &(0x7f00000001c0), &(0x7f0000000140)=0x39, 0x80000) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x802, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r4, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r9, 0x8901, &(0x7f0000000080)=r10) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'team_slave_0\x00', 0x20}) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 22:17:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'syzkaller0\x00', 0xe00}) 22:17:21 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) pivot_root(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00') perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0), 0x0) pipe(&(0x7f0000000800)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x800, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000440)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f00000003c0)='security.SMACK64IPOUT\x00', &(0x7f0000000400)=',*\x00', 0x3, 0xee4f4f487c6f2a06) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) dup2(r4, r5) r6 = gettid() ptrace$setopts(0xffffffffffffffff, r6, 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[], 0x8, 0x7, 0x0, 0x75f2f7ec, 0x2, r6}) bind$inet(r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000240)={0x5, 0x13, 0x11, 0x1, 0x9, 0x7fff, 0x5, 0x63, 0x1}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") socket$inet(0x2, 0x3, 0x1f) 22:17:21 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000000700ff3f03000000450001070000001419001a", 0x23}], 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_gettime(0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r8 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r7, r7, 0x0, 0x24000058) ioctl$LOOP_CLR_FD(r7, 0x4c01) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000140)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x84f0) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') ioctl$VT_RELDISP(r9, 0x5605) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 22:17:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0xa) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000000c0)={'ip6_vti0\x00', 0x400}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f00000018c0)=""/246) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) fsetxattr$trusted_overlay_redirect(r5, 0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x2) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000180)={0x400, 0x5, 0x400}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x6, 0x3, 0x0, 0xfffffffffffffffb, 0x1}, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r7, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) [ 1579.694286] kauditd_printk_skb: 952 callbacks suppressed [ 1579.694297] audit: type=1400 audit(1574201841.485:235046): avc: denied { map } for pid=6296 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:17:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be", 0x60, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1580.028631] audit: type=1400 audit(1574201841.495:235047): avc: denied { map } for pid=6296 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1580.076345] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.078196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.084249] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.097504] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.108185] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.118300] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.119995] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1580.127410] audit: audit_backlog=65 > audit_backlog_limit=64 22:17:22 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0x400, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x4, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mknod$loop(0x0, 0x1000, 0x1) wait4(0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000140), 0x9, 0x2, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000100)=0x1, 0x2) 22:17:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c4", 0x63, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:17:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c4", 0x63, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:17:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000000)='M', 0x1, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 22:17:23 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) socket$netlink(0x10, 0x3, 0x1) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0xfffffffd, 0x400, 0xfffffff9, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x2000}) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000300)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="2ce05ac02c40121f2f73d7", 0xb, 0xfffffffffffffffb) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="f7bc87aff7163ed7d3694a6e5555b7e241510d6e256658ff8cfa869907e1a94c9d4f4f9f27c81c2450d6e7c1134ed4fdb2fafd85e15505729ae96833063bc493c0ff508856d5599d1c9ea7fa8cb41a7308839cea25de8889ea957751937189585d894596d3230841aac36284d36ddf797dd9e12e6547dc680e516cf63a8420b8b43c020efe876f5b0a4d0b0dd0572ed90d844315d1602e4e706e19a7a9b0f4ec0da9ebda32807a3185aa51a54c2c4d", @ANYRES16=0x0, @ANYBLOB="005025bd7000000000000e000000080004003f00000014000300030003000000000008000800808112dfa7566d611e43ccddf5e31cab618e72dda907820200000500000008000000000000bd24b0000000006e0367bade9122bd6bf68fc5bb0e5a8ec5857ae2b6ca46fa5f72a82fe1baeebaf7cf3d8caaa9268574f1484e96cee34bf2da168e507da1adaeb41e146852416cfeec"], 0x3}}, 0x0) symlinkat(&(0x7f0000000000)='./bus\x00', r7, &(0x7f0000000340)='./bus\x00') [ 1584.714964] kauditd_printk_skb: 643 callbacks suppressed [ 1584.714975] audit: type=1400 audit(1574201846.517:235441): avc: denied { map } for pid=6395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.777695] audit: type=1400 audit(1574201846.517:235442): avc: denied { map } for pid=6395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.827634] audit: type=1400 audit(1574201846.517:235443): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.857224] audit: type=1400 audit(1574201846.527:235444): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.890773] audit: type=1400 audit(1574201846.527:235445): avc: denied { map } for pid=6395 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.913769] audit: type=1400 audit(1574201846.527:235446): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.942368] audit: type=1400 audit(1574201846.527:235447): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1584.975643] audit: type=1400 audit(1574201846.527:235448): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1585.000151] audit: type=1400 audit(1574201846.547:235449): avc: denied { map } for pid=6395 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1585.032684] audit: type=1400 audit(1574201846.557:235450): avc: denied { map } for pid=6396 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.718013] kauditd_printk_skb: 1127 callbacks suppressed [ 1589.718023] audit: type=1400 audit(1574201851.530:236578): avc: denied { map } for pid=6522 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.775088] audit: type=1400 audit(1574201851.530:236580): avc: denied { map } for pid=6522 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.821453] audit: type=1400 audit(1574201851.530:236581): avc: denied { map } for pid=6522 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.875133] audit: type=1400 audit(1574201851.530:236582): avc: denied { map } for pid=6522 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.899629] audit: type=1400 audit(1574201851.530:236579): avc: denied { map } for pid=6523 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.934983] audit: type=1400 audit(1574201851.560:236583): avc: denied { map } for pid=6523 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.961433] audit: type=1400 audit(1574201851.570:236584): avc: denied { map } for pid=6523 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1589.999177] audit: type=1400 audit(1574201851.570:236585): avc: denied { map } for pid=6523 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1590.043369] audit: type=1400 audit(1574201851.570:236586): avc: denied { map } for pid=6523 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1590.087760] audit: type=1400 audit(1574201851.590:236587): avc: denied { map } for pid=6524 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.728982] kauditd_printk_skb: 1114 callbacks suppressed [ 1594.728995] audit: type=1400 audit(1574201856.532:237702): avc: denied { map } for pid=6650 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.782593] audit: type=1400 audit(1574201856.552:237703): avc: denied { map } for pid=6651 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.818588] audit: type=1400 audit(1574201856.552:237704): avc: denied { map } for pid=6651 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.846242] audit: type=1400 audit(1574201856.552:237705): avc: denied { map } for pid=6651 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.902568] audit: type=1400 audit(1574201856.552:237706): avc: denied { map } for pid=6651 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.952562] audit: type=1400 audit(1574201856.552:237707): avc: denied { map } for pid=6651 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1594.986803] audit: type=1400 audit(1574201856.552:237708): avc: denied { map } for pid=6651 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1595.042434] audit: type=1400 audit(1574201856.552:237709): avc: denied { map } for pid=6651 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1595.092452] audit: type=1400 audit(1574201856.572:237710): avc: denied { map } for pid=6650 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1595.114782] audit: type=1400 audit(1574201856.572:237711): avc: denied { map } for pid=6650 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.736466] kauditd_printk_skb: 1132 callbacks suppressed [ 1599.736476] audit: type=1400 audit(1574201861.545:238844): avc: denied { map } for pid=6779 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.790054] audit: type=1400 audit(1574201861.545:238845): avc: denied { map } for pid=6780 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.840197] audit: type=1400 audit(1574201861.545:238846): avc: denied { map } for pid=6780 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.880933] audit: type=1400 audit(1574201861.555:238847): avc: denied { map } for pid=6780 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.905540] audit: type=1400 audit(1574201861.555:238848): avc: denied { map } for pid=6780 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.934964] audit: type=1400 audit(1574201861.555:238849): avc: denied { map } for pid=6780 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1599.980052] audit: type=1400 audit(1574201861.555:238850): avc: denied { map } for pid=6780 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1600.017691] audit: type=1400 audit(1574201861.555:238851): avc: denied { map } for pid=6780 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1600.059980] audit: type=1400 audit(1574201861.575:238852): avc: denied { map } for pid=6780 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1600.119906] audit: type=1400 audit(1574201861.575:238853): avc: denied { map } for pid=6779 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:17:45 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getrandom(&(0x7f0000000080)=""/248, 0xf8, 0x1) r1 = getpgrp(r0) capset(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000040)={0xc82, 0x7, 0x101, 0x6, 0x1, 0x8}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ioprio_set$pid(0x2, r2, 0x200007e35) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0xff, 0x49) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x82a6500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:17:45 executing program 3: socket(0x2, 0x64145462a8a686b8, 0x7f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = eventfd2(0x7fff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x8}, 0x9540, 0x3, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(0x0, 0x1141042, 0x11) sendfile(r4, r5, 0x0, 0x8000fffffffe) execveat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000180)='raw\x00', &(0x7f00000001c0)='vboxnet1lobdevsecurityself\x00', &(0x7f0000000280)='trustedem1/selinux\x00', &(0x7f00000002c0)='.\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)='raw\x00', &(0x7f0000000400)='raw\x00'], 0x100) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000240)={0xa, 0x2}) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 22:17:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socket(0xa, 0x3, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x6db6e559) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x21a2784df02c4e51) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) futex(&(0x7f0000000440), 0x8c, 0x1, 0x0, &(0x7f00000004c0), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200, 0x14) 22:17:45 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0xfffffffffffffc85}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x138, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xa4}}, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="fd97de27117382", 0x7}], 0x1, 0x4a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000006800)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001c00070f000095790000000007010001bcd5f152c9b961ba8dc5ca7aab660a1287e2eb2f9ee01d2873cebc871bb870d7f62c9bf4740ed6e57efb987fe4c7568812d5f2eea3d268e4e7f48c562009ad7dbf3373047dba6d583e3eb3e2b43fd2cbe98b5fc7ed535bd27dcaa8b632aa765d75763e7354b0efea95c70616ba488a4961f0fae7bb6cd1", @ANYRES32=r6, @ANYBLOB="dd3d1f240a0002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 22:17:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000010) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x187) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) prctl$PR_GET_SECUREBITS(0x1b) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x302) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) [ 1603.843756] selinux_nlmsg_perm: 102 callbacks suppressed [ 1603.843769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48847 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1603.929552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1603.998791] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1604.088501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1604.169308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1604.265961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 22:17:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c4", 0x63, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1604.605488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1604.748726] kauditd_printk_skb: 650 callbacks suppressed [ 1604.748735] audit: type=1400 audit(1574201866.567:239504): avc: denied { map } for pid=6868 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1604.889030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1605.042756] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.052588] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.060502] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.065055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 [ 1605.085943] audit: audit_backlog=65 > audit_backlog_limit=64 22:17:46 executing program 5: memfd_create(&(0x7f0000000540)='\x00', 0x0) r0 = inotify_init() ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000300)) r1 = socket$unix(0x1, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) openat$cgroup_ro(r2, 0x0, 0x275a, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) pipe(0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000080)={0xf43a}, 0xc) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e21, 0x1000, @loopback, 0x5fbc}, {0xa, 0x4e24, 0x2, @local, 0x7}, 0x7fff, [0xfffffff9, 0xfffffff9, 0x100, 0x5, 0x800, 0x8, 0x9, 0x20]}, 0x5c) fallocate(r3, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_netfilter(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001780)=ANY=[@ANYBLOB="8ab69db3f4"], 0x14}}, 0x0) r9 = dup(r8) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r7) bind$inet6(r7, 0x0, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r6, 0x800fe) sendfile(r9, r10, 0x0, 0x8000fffffffe) [ 1605.092864] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.095196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.105684] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.109021] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.121701] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1605.389896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6854 comm=syz-executor.4 22:17:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000003dc0)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000004100)=""/207, 0xcf}}], 0x3, 0x100, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000100)=0x6, 0xfffffe07) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="f0000000000000000a004e2000008000c6dfbdadd38c62ec14e7db7196b080e80080ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000030000000a004e2300000081fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400007fff00000000002108000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000006bc8e86153adb45517da7dd8b9c2aa5a90300"/528], 0x210) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x3, 0x2c, [], 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f00000002c0)=""/44}, &(0x7f0000000380)=0x78) pwritev(r2, 0x0, 0x0, 0x6) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f00000003c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syslog(0x0, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r7, r7, &(0x7f0000000180)=0x74000000, 0x5) 22:17:47 executing program 1: socket$inet(0x10, 0x3, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003640)=[{{&(0x7f0000001300)=@rc={0x1f, {0xf5, 0x6, 0x40, 0x81, 0x8}, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f00000019c0)}], 0x2, &(0x7f0000001b00)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffffd}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x60}}, {{&(0x7f0000001bc0)=@sco={0x1f, {0x81, 0x0, 0x7f, 0x0, 0x5}}, 0x80, &(0x7f0000001d80)=[{0x0}, {&(0x7f0000001d40)="d1d7f01fc7fd6277f89b7337b5", 0xd}], 0x2, &(0x7f0000001dc0)=[@txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14}}], 0x60}}], 0x3, 0x20000) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x20, 0x4, 0x6, 0x0, 0x0, 0x0, 0x2c0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_config_ext={0xd96}, 0x1100, 0x0, 0x4, 0x7, 0x3, 0x6, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) fallocate(r1, 0x20, 0x0, 0xfffffeff000) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') 22:17:47 executing program 2: syz_emit_ethernet(0x86, &(0x7f0000000140)={@random="e7792b82ffd3", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "ee0600", 0x50, 0x40000000003a, 0x0, @local, @mcast2, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "40d6c7", 0x0, 0x0, 0x0, @ipv4={[], [], @empty}, @mcast1, [@hopopts={0x2c, 0x2, [], [@generic, @hao={0xc9, 0x10, @local}]}]}}}}}}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000000)) 22:17:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad9", 0x65, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:17:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad9", 0x65, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:17:48 executing program 3: lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) 22:17:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x0) r0 = inotify_init() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x4, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) shutdown(r2, 0x1) r3 = socket$inet(0x2, 0x4, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/user\x00', 0x2, 0x0) syncfs(r4) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) shutdown(r3, 0x1) socket$inet6(0xa, 0x800, 0x1f) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e1f, @dev={0xac, 0x14, 0x14, 0xa}}, 0x7) shutdown(r5, 0x1) r6 = dup2(r1, r5) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x6, 0x30}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) inotify_add_watch(r0, &(0x7f0000000380)='./file0\x00', 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) inotify_add_watch(r8, &(0x7f0000ac5000)='./file0\x00', 0x80000000) rmdir(&(0x7f0000000040)='./file0\x00') 22:17:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000040)={@remote, @dev={[], 0xb}, [], {@canfd={0xd, {{0x1, 0x1}, 0x32, 0x0, 0x0, 0x0, "eaa81c8fdb2f73b10ff75010949b89a438077a8b1eda9ba719d8d123a1f1528dd8f2f338e82d02ed7d0a10789e9d52d8743745cbb6cf584db6198ca03e71626e"}}}}, &(0x7f0000000100)={0x1, 0x2, [0x63d, 0x57f, 0x754, 0x891]}) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f000000ce80)=[{{0x0, 0x0, &(0x7f0000007e00)=[{0x0}, {&(0x7f0000003880)=""/239, 0xef}], 0x2}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) sendto$inet(r0, 0x0, 0x280, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003a40), 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r2+30000000}) 22:17:49 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000500)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) r3 = fcntl$dupfd(r1, 0x406, r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0x2000}) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x2000036f}], 0x1, 0x20001000) 22:17:49 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000001940)={0x0, 0x0}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r9]) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r10, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r10, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r10, 0x1) sendmsg$netlink(r0, &(0x7f0000001a00)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0xe401200c}, 0xc, &(0x7f0000001900)=[{&(0x7f0000000140)={0x1ac, 0x20, 0x10, 0x70bd26, 0x25dfdbfb, "", [@nested={0x19c, 0x1e, [@typed={0x8, 0x2a, @str='\x00'}, @typed={0x9c, 0x1a, @binary="dc5ae550c89c706e42da2f9efc931ae0a8bd54963315fe164535d44f7b5c2d5e435a18c5d7392845995ea382c0efdfdafaeea81b2954889cc6210d9762ef3027ded1e09eaadd6f205a722fa17776a3459f0f904e62411569ad239e12c73522669af082b46436c38007c6bbd88087f09eacc86d0218c26edb91388d3c843bada1fadb1b7747a4624a30b101e7db563e7fdeb351f3a23b"}, @typed={0xf4, 0x81, @binary="e50d02f2410e8abbcbb86b06e7afa9f76f4b23779521d249aa29c9e1bc88fddf043127e1894a4155b1af5c44e5dcac0770171c18ee79ad367e6fbcaf9ea60a273dd4c511d7764fb04b0c9a4005ac11a1eae70208c7a5e6ddcaad69d5f2e4038b8b8362f8c348bd3b0cd25979ed01042d15caa4a18f18c648e4f625e9187b882e9db039055296906547fbc5a85a1e692fb243f327436c3f52ce9b1ae5321590f69a1fab6cbeb7f995eb52f7ab3c0a03bc9e59dbe82a7edd67acb2ba172a376bbf2c7b2a9097c46a7f1e4aaf12ab1d91a55f5c05a1c1a6209a8aefdeedae949cc5b1880a9c89afe26e03c9852e66c5"}]}]}, 0x1ac}, {&(0x7f0000000300)={0x15d4, 0x41, 0x800, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x1244, 0xd, [@generic="56ae4619a38d4018b3657b25bdf32f39239434203fc30849872a97c029b988567fa8586641b780355d4ed97b56b20ab7b4b2eab2cd36c9c0d2866044809127cc45d7612a7b10f6fecac178a0972ac07d367fc4e4c8b0942a58043e9ac400bed049b79bcf09676255d0798a4b4d5275fa94db37d23000db5fd59f8831e6400dc3c20d79e1297176ebf71b70553cc98c9aa9337fbd862f7598085891c10ebaa21b23822a0e9d25dbcb421865e90d67f64c576c580d05a845d5f7d2f5c055609129a6ddfa3fce9aa7dd70ef77aa6a37952ee65b04c31c4adfbdc7a88345e0dbdd", @typed={0xc, 0x73, @str='trusted\x00'}, @generic="9a9f39aacd51a80d43645b5241aa98103b1a547f4ad8ace345d699c307f7a75f5d7401f1241530b6602ee928d6b59d14b5cdc15cc3feb6ea8106b238715eeaa1b059594d1d0ebeb53b012a6ef9edda90c8bda2af1d77fd2634744652838369dbcf922ce2e716ddad74b9e8ebbaa1559f09c96f0e919250b255e342cbebe1471b8a0c4d7e66ac47317d80fb62696a64744211b541ecaf7906e0c7c605ab51e43911bec4edc3b27b9708bc5a3c3fd2543f90104a6bf005687c0be41d4470b26664e1bd36e1f79ec9cd47467ab3b10885651db53d042b915d50800193708f66e3bf3742423b944202fbd91e2aee5e5ed89a26add35f372f11d3579f1e658c479b4a31e5bc41fd11f5c05a01352ce7cab64801014beb65e47cdf790291d67cd2415d7bba399f2f5c84ca75eb36f5c8a8b84d7ff7fff1cf11c3c55325e07133723e4df624d08be1f2657bddee3d6192739e17aab9af3553e5b2137f3fe193f0a07bd147354145399b22e33d4218063662da1722e836ba23ffca43299a77db1af4c5ead329083216da1a7b4a160dfc544261f073f14e04ff9b09960af8d6ae6d211f175ff4deec0aad8200672448572c7896bc9a3c39d4e4c27d3d10a85385fcbc08d40475d9faff1a5d6dbba6a81d0241fc1dffb0c79e434c6f42589293cd29ac9c609df0e53ddf8b67fdd9b1e7d37d5228f138186cb4b27f3a1d6c2f5bf47bf8080c1ae43403d4d0386a6418aed807a76b1e754082e21dc9530e26430e9c22342123a10e07f4303bdc4ed43958f168a5791f57ba88d3470dcc73421f556e8bf68f135242144ad08dd96c489805bb4fc6ab8e1ee62a36449748aa11b0f91eed5c9738b6e4637c86fbf3f578db91233d89b0b7ec9cb48b1ee67e68b9d70520fdddc2378c23da5acf53b62a7112c24d91b8087bb79586cb31ccc59c81fc4e7e5a3ee31149cd3e6b12be5045973566d09c47b1e7d501a4fc6307d3b675ad77cbdb9653664fc71f20ebc16ff1f7f8940e26525c119d73836a8d50cdb351fd7293ff4a5d872a4c2f2d4b8b7eecc253f5fc378e21df715331d2ec599147c5a0b69324628c3aaffc062f662e1742dac76b9ac6cf38981d644f24083d4c434e825d1f8b6d0b4ddbab217980e6969a54a0f7c0a5a8993fd9de1233868e8c5c5067aae7574b64b06299f61d154908a6926c0eb3cc6491b6c125a14b79e260300b66fe9103eb11dd74db2828473958a3ac47dce1e9a4a5983a02cfc96103db6cf809b20ef67fe62b71263ce4e7a3b0f453f0cdcec9b52b412f8b15aa6c93180a4f5184f6c0cf05ff9f872068bd9748a28abe5ee1f2f9558ecaf9029250c5d2d08579c857701819f91c1647de9786eb11f98db3ad2db5ad754e85824220b504998b6ed3af02ec3c2f3ba5a69a45a8cb17c95efac6d6603ad07878502fc9552188e49901621d57a580d4503f3c7f6e5af86c0df7e30cbb1e2776e9d1eaf2e36b27eb2e4c6857cfa33c0df65f4f3f66aa08eaf69f6060878a0afea34965c6f029ef2de76d206d4208372fbf1bf2beed8b650d373b273a803d9cc9ce4ea89d4f6775d5ed6089acd570ac9af528761bb14cc549b93f05386f09861df6bd45f19b477ee7bbe4ff150ac846a741f6ff043e51b0a650fb1ab46f9e3ee6faf983f1b416f314a95e58c559c97d8443d5e63745ff61a2540dd3bc6c5e24e5c9be64000641595384dd4c3d89310c722e76898d43bb4aac179c06e021cf0595d1a166c416efa4e8ffaeb08befed399929e05195d6df76ab4ebc65680b67f3c4c271d8660b444c1417dc5505b972849eb7e463ee1a9ab9be4b699da9ce3f7b82784da3445324cfa5e3d8d3795f216def9509bcac62d5621f803c73bab3e040b09161eda00d19fb065d8a9fabbe0eb5572dd094f044ddec4222e3a5ae8e217a8a6191074c4f355005c4cb5f89c6baec99cffeb4d6b492413c41882758e46d8d10ea1a31b468f59b47a7d8ca7344bce5323f703e2c88369c1fde7c89a7ae49a124b9747d8d909aa11850385366182001d8dd170fccfa5ba85f225c2bbc560f8aa3268f4fc998760ac8a1e511bece49d2000df2069e59a9eea12f65c6f1e3216b0e41f7d78c69b0b3545e259386c74d402cd1b68909750b4294b6cd7766b7311dc5afd34ce4aee12ec72f447c346e0a067be52a2e6fafaece0b73f8ce4e5b473c7da1493429c0ea203287a3dab5c2c75b91ca57e52a2f641e5d5891068927d570f271d72a72b0fb60d0f3303f5ff7e21ce6562ba6956b25e259002460ffe58f862da85d99ea11cdc186448500fc540ff5cbca9d1175a648a15efda7d71aa7ee31d56abaf09842db7e7089aadff6fb207b83703959975e70e092e7073951fe4fba887ba4362e567763838dfee9cbb0e579613fac326b19f5a8d9537872d3a3b5e9cf2685b45f33703196c0ab08002d03aa80cc9cab01165dbfc407a61e81c85467c9be53e4a1e6d891a9852f7ad0ba29c9ad0541fc15de1a56044f78da022505333a2554a73e20681febf30e93d03035b6619a960a91e40f8483d50301e89392f0d0394a2a35b0080153e8c036577f67ba6bf32ad778e40a9737cf8d84fb84c85d2d33301bfb19d44d1d0b091df677606e99d3c36d015227a6af8d58984ac6eba7de572e92b2d9b83afa3655291a716a2d3d110c4bb384cb8b0defe12ecf3cd0926e186de2649a75ed8436d121373b15ddc6df2766526da4fbffacfc6593d73cd10ce45dd966b15a773d1c86b2f760b3a6e85810957b0b42ba866633ad78ed2a70daf246f882a06afb6da5b301398e8f4fb9cdda5c69f275ac721ee803ed6eba13949afd5114f7b1a5669dd119623ead86a63afc806cd882f76f250fd6291a5c4d822282cf8cb08032a63ca2def22226de11523521a299c8c841481ecbeae0bad8dcf0ea5fa308efd82568e7c2cf326692fdc23fe884df9eaa31b9aeb21979eb76fc63cbb74028985ef55d62134b48c5f42ee3bd3a91075c6904eb8370d42794261e6c1fa81be281efd5f4098d0655cd668c08869d4160a8c3adf304a38561aee8ce8646350b9ea5fd12b0ca97f19797615cc5fe9812c9b8d346163d5a480cab084e9e099a174dce75ef2fec5c5c76f32327388bf2458c94b477617d869886e7e04e46f2fba748cdc8fe0b67300287e2f53a7804bc9eca41c8f9157ccda927c065ba73bd729e4470e5361dfddeff0ee93e83cef395af85d7438d6ed72317b1f936024b702bd6e43b05856e0edb860f94bd8d2e55eee9825959861eaf7682a80cf5049607945512ca5e89ec511ef8ed8a3aa5799ceb7500c7b3dfcb87688a2499305050a7e1cf5c70483060337f6c4342997c3d5fe1955b7f9dae6e376539517c001a838bfb5af926485c127e53a00adef5c0b477b18c2b6604c4d8f6f22198459ea0d633bb4e4a61fcac6e2a5c23ed1c19dcf95ebe1a1635dccda034c51cbaf4c5958ce1fab1e617d5de503333d2a97b45db110b0bec3ef37d0247c73723471dd17a56cb3eccfdc68eeacd8b97f802b424f25b91a67f72d3dbb8e03a366cd219500ea85b685613b8c6ffca36b409be058644e1da10e043406f92338290b53cdff623e1a75a460afc15601420cf84ca58e28e13e1eb37199ec26cb81c87c8b1806eafd427d78e537ec6ff3920e90511f7c5c2dff37086cabf3d7c71f03f8cb3001fd5a3cab0e226a62e51b1e5e9a638ab406a4dd114b95153df6d3f375d9ac891c5bbff0deb92168e26d9504d2a885f2f8d5350a42d9422c167917ade68335be3bae6aa131ab97b038b6dab9ac624872b4361dfbfb79aedf592b55b2043d50f63187da7b09fe7b2752b3a30b3800de2af23a952c672010d4f1bc161c1085b66cf99b1fbba27ed6d2dc9720cd5cd8cf1aeaada00f40c9e75c17482ef7011f9a7eb82ab38909d452570e58b82782bcd043476160c406d320fe7fedc3c257fc0b5c753254e7bf15daeb92f9e7f8fdf06a95f072fafd3ece6dabf7377dd9bb8566baba728810e883405e19dcdd3e81e0faba7bae7b391c5a2cf1c77db7b07ca10c577b239805291b5f7aff55a7a50ef4d76f184edc8387a35ba6a349c28d5fd9ba06eae8cdb79a7f8f557d94d7c1bbe6d2e851ef410edf76eeb70144589c7cfd3945433235ae4f9405f814b54e299d655be9688338396891b812fe357f41425eabeb77c9308c18e130a3525f3e9da8d8718a9df56dc8946fa665023997295edd189e2c9a6344e206b2756ab2e3fb56112395c904d28ad46535371f2a269fff766d28f4e800ebb425700716de2ac4c94fe15c1c77c09f7aab47b013d85c04894e6c1c9ca02f706f2534ae5c54f1070f7283bfaa26531596730512cbc7766b6b327247bd95dfaeda0eaac69aa40027593bb0a909e02ba278efb07e09a7d070a54f129fbb663421ce8d95a961b4212301089154cbb93139032d5f6674229dd0b062b2c6d156594237f8432cfca48bcf759c8f482fdc26dc6b0c097b7c4916904e46fed9d35f31be87b4aecb16f4e6572cde1ca5a171316cb6bc4ff9dfebc4421258a56dd6b2bfe3479b0c1af80943cdebb5d96fe21ca651c7be067e9a3652a46755518de64df64c71b5c888d2a74e69c1d4c0116351a4b62e2432d8fe7260ca7e9bdf5f4433b614367c257dfdf9e3d2f237e9215f02e40c655304c9226c803f022a4622e3e6e2ca9df5d29a63c6d3941557795e5721dc9690700a365a6271019cb5ef7d4ac9d1f5947d55e1b9fc94d3443a4d5ce56da52068b15ac21eb99b1146f3aa68d3cd693586db36bed6c1df533d758269f12c3a3af4ff7c05973576791f0c55069720a0f04eee08e2506c1b8bc12af8a339cc43981095944a547a8e4754dc5749baa7fd0f6fab5a23585977988138f17a884e984e18b4b66638deb552f8392587d939865a8806374f5f8790d346f9c7cdacb3463786a331af64ca96a397a5bcc448afc430c15703740372080e9b4a4db37d375cc5b3606cd9dd2b33cb66fb2a1353a90fe45a242c579e3c9bfe3fda8537e27c7d1ea5ee8f13a36d3b26319e1360fa9f8efceda606671860fa391773a4d42841af773a346ad4c40ae032612df595f8ca76bead52f564e94e5dd722c05bb8722d54b66ac9a4750be08c8449b1533234f6495955d8b861a0398e6451285fb6d0946ce3e0ce8b5a9732d668a199922f0a209c9960399dc86a984c85fb92cc0f2cfa36477353f0d4a9d6c786ce3362b649196b2d96cb6c3eee6491d77315755129e65a65ff102953db28ca1ce793c8bcd0bc7066cbae5e182a5a01b65b999df1410a629987d76cab61ed584135f9b0991405f57e2fd9c03e53f08a0c4026eddc906f7c3f3cdac28fbd2a0246458a241112aef5e47a622b83ceb382609973a0cb948515b6a0aa2dfc43628ebe56e5385bfa926fb4a9a209872cf72b26dc0afe058da0e156bae41490ad6b05619e69019b121e8e213d02bd3d8c0264b217314f68f79d8094e2e03be3d75a18dc62f22f9ffc28318b228037a26effb37ecc32d2b24518f2aebc5aa1eade3078808ea74b339dc36efad9c358ef217ad6ebb01af7e940d6c73d196a6ff82adb99d93bdb1016c90effcab4c935bac13eaa0bb10b905813ee39d3eef18d7af88975e8db2d8e591e931bd13135def025ba8c079279fdc9d90af7755637a3f55da0d310c2b0902511e20ab17790b9cd078d79296c3eacfa55679e1613c41414a8d237eee8976098849d7edbea96fe1ad934c2938f3704ac6faafd0e9930c8646274068a99cefb7a051adfadcce7e97d73d435c5a81ea2e50f3", @typed={0xb0, 0xb, @binary="2cc88df46a551d1b2adce682812a57990bbdc2c7ec27ed4318199dc8a58bfcddbbd414493020781eac90f47ca20734858a6e83a021c6946d769a1a3eb0faa15e51cef93dd51d415e044c2c1ba4bd8798ff4237b73754d4a992f44a81cea01ad4819b5b0e0b3b78564801ecf594688a2bc99979392341db55a94694e419b4dc2e3bd143dc54e5d479fbca7532db476edd7012ae46eed7b770c9fcc906632fc133da1349907ea65a457aef4001"}, @generic="6ceb38ebfbd2f58298e0578656393df04376cdee4e613c08534e18002f2894ab9ab045de88a8edef37dfc13fac943a351aa2757f3d558d011c8acf758f2ce643a621427b03c8467b4677539835b6adc257bbf68b7b6fb04bf09b01829956edbbfeaf9aa657fa621911e8d704e254214fbcf2adfed3f2db8535ea3ad2d9b4ddb10574f5e0cd91827ce2284e70b8b2caf21af3def4424a47c2df0797338c0e23ac0f1f"]}, @typed={0x8, 0x11, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}, @nested={0x1a8, 0x35, [@typed={0x4, 0x23}, @typed={0x8, 0x4, @fd=r2}, @generic="ba59209d3c531c36bc7cea7979302b65d38e8846b5f3238b3e69f6e7f11f92874ef4f7085bca0bb04885187779a54205068294993d3e3483cfc7af4a1a48a234ea30a292086bcadcd4a647cdc8df041382e3a2efa3e77dc82f26a807161d30ef808c608125fb3371ba4ece7af421a4b86116aaa6a82804caa83ddb77156fc9f7c0d108c0800540f495a8c6080785b6d169e6b08c0d0e419d1a711e7715c2bffbb004c2f2cec5b43938439e37274f1a289f44dd7cc3c5018fc40f8ca3e34f57246b93841c93f1cb8dd3d4626a637f36b17af4a2f30499eab9a5255da0f1b4173418a8bd4729a55d9f7fcb234c6eba", @typed={0xc, 0xffff, @u64=0x80000001}, @typed={0x14, 0x2c, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}}, @generic="be9a0711f4db9ea4d4a2386a8013455c99d331a5882c33ec8e15cea123e2d19028b05d8cd7775c5e2dc222cf5600829265e422bbd3d501ffb1c69e47bca1e8c4f9cc62a3258bbf5b9e70d533e6268f43e392237585226c3bdee40c4d5aaacb21fd248f590cc94be7b0130213deb3efc3cdf3bb7b569de1b988e9ec2df0943b790295e2896f50d90758"]}, @generic="95477e1a60455d71338215bb1f8881d19d8f49e7dc425b27cf7c04d2d279348762a14ad4cf53213ab890cd80cd8c90a43d7e4b2d1b11ed3342a62d242e97a6f6853526f23a5e1a78f4a02eedc5cedd9cdf66b1600b6355bed2c0f8e1e7133e53cb0dd300124bab2693c51e4dbe5e26f6e3347a841f4b3f8cdd2883ca78ea43a679a5a4e8e13c0357adf0f12d9760e460e86f518497d9341f43447374ffb9a06f86cf920726d40fbd6322bd20d5ef2d7c78fed304575caf23f7c2905b1f4e02f163f35d65af734592ce8a5e4de4e526c8577265f939cb8442070c706033e63fd6580bf3513a749d359c11d0ce7b495140486282", @nested={0xdc, 0x3d, [@generic="f158f8cc68e1c0cf5dc28d82d2bcaa48ea77705d76a5c2685b7ba1", @generic="1ba1ad7d050f4a98b657377ccb88de1b7c78225c8c2d4a88af46699003af519f888e0c96e43214f4f3231872ea130f14d5baa5b437234f9710b173dd37ef5032afb79ca350199ef5fe428aa5d9fb5f3dbf64d604545bd1e28db62ffa7eb731b2d1daf218c270074ee789afbfc38fa3776d6ceedd90334bc945822db86fe20899eade898abe88ee1ca8e448efe45f979ad691da1a4fbed7a7f759e42b4b5fae1004", @typed={0x1c, 0x0, @str='-ppp1posix_acl_access\x00'}]}]}, 0x15d4}], 0x2, &(0x7f00000019c0)=[@cred={{0x1c, 0x1, 0x2, {r5, r7, r9}}}, @rights={{0x14, 0x1, 0x1, [r10]}}], 0x38, 0x4040000}, 0x4) io_setup(0xaba1, &(0x7f0000000000)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) socket(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) 22:17:49 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$FICLONE(r0, 0x40049409, r3) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) mknodat(r5, &(0x7f0000000100)='./file1\x00', 0x2e69d5e723d9dade, 0xde) connect(r5, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x4, {0xa, 0x4e21, 0x7, @mcast1, 0x9}}}, 0x80) open(&(0x7f00000001c0)='./file0\x00', 0x101440, 0x200) r6 = creat(&(0x7f0000000200)='./file0\x00', 0x110) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000001280)={0x1, 0x2, 0x1000, 0x1000, &(0x7f0000000240)="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", 0x2b, 0x0, &(0x7f0000001240)="a6ee1c3adc61b8a162ecb631ec3942c31799b6e794a3d14e0dcd7d30beb7c812c65a9685d62accc8c609fa"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001380)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000001300)="aae70aadbd9d3929ff520547415eadd932a2c3dc7cec92a5d8368627948b41b077c18940beb5c4fabaf7eb4a7bd587da308812c13b733665f19521d2d66be6a05c", 0x41, r0}, 0x68) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000001680)={0x3, &(0x7f0000001640)=[{0x4, 0x6, 0x51, 0x2}, {0x20, 0x0, 0xf7, 0x8001}, {0x1, 0xdf, 0x5, 0x3ff}]}, 0x10) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000016c0)=0x10001, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000001700)=0x10000) r8 = openat$random(0xffffffffffffff9c, &(0x7f0000001740)='/dev/urandom\x00', 0x10001, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, &(0x7f0000001780)={{0x0, 0x0, @reserved="294a2b65b10b47014ea355b4d6e5a773a42ff424fed6acf115d4197f1b5657e4"}}) r9 = dup(0xffffffffffffffff) connect$netlink(r9, &(0x7f00000017c0)=@unspec, 0xc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000001800)=0x0) ptrace$setopts(0xe709, r10, 0x5, 0x0) pipe2(&(0x7f0000001840)={0xffffffffffffffff}, 0x80000) setsockopt$inet_int(r11, 0x0, 0xb, &(0x7f0000001880)=0x10000, 0x4) 22:17:50 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)=0x7) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x9, 0x13, 0x1, 0x1c, 0x0, 0xfff, 0x0, 0x167, 0xffffffffffffffff}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") 22:17:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@getrule={0x14, 0x22, 0x100, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x20040801) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0xc) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)) 22:17:50 executing program 1: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x3a, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"/320], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="58000000cff3abc04af0565f6d0c6cd490eefe470dc7fe0080ccaf5996c7b2d54a030866dad9c28b2600a97a18bb2c82e3a26daad14c4eb01ee3724c8479b0c404e458da139bc3e75cbfbdb8595eb2a5ecc44e627122ab3c6d4f912b95c3124dbfce7257093660a6bc082c308f3620dbd47f36cc6315fdc4924b66230b349efa449c40750ca0cf8e864c6f2288a353fe105cf23697e13b788664a43ba64ecca127dd0133116dd45d79d63c0d2645a7fd87858761db744fe0592198ae206479d49fc54f4e508e3240044c94f627c818675014fc3a581af47c1ce16ed5155b2cf3e42954cfcdfdc16024575ab90cd740fedc4fc5", @ANYRES16=r2, @ANYBLOB="00042dbd7000fedbdf250500000044000200080006005d000000080002004e22000008000d0001000000080002004e230000080002004e230000080003000300000008000b000a00000008000d005e000000"], 0x58}, 0x1, 0x0, 0x0, 0x80001}, 0x4001800) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) recvmmsg(r3, &(0x7f0000003c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/229, 0xe5}}], 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003040), 0x4000000000001d4, 0x0) tkill(r0, 0x21) r5 = dup2(0xffffffffffffffff, r1) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0x1af8) wait4(0x0, 0x0, 0x0, 0x0) 22:17:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000800)='proc\x00T\xe0\x83\x01V\x87\x84\x7fr\xe4j3\xe8\xff\xa06\x83\xa80x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) getpeername$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fstat(r4, 0x0) 22:17:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) open(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') [ 1609.756341] kauditd_printk_skb: 339 callbacks suppressed [ 1609.756351] audit: type=1400 audit(1574201871.580:239772): avc: denied { map } for pid=6993 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1609.972370] audit: type=1400 audit(1574201871.610:239773): avc: denied { map } for pid=6994 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.192819] audit: type=1400 audit(1574201871.620:239774): avc: denied { map } for pid=6996 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.269716] audit: type=1400 audit(1574201871.630:239775): avc: denied { map } for pid=6996 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.381812] audit: type=1400 audit(1574201871.630:239776): avc: denied { map } for pid=6997 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.438306] audit: type=1400 audit(1574201871.630:239778): avc: denied { map } for pid=6993 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.500586] audit: type=1400 audit(1574201871.640:239779): avc: denied { map } for pid=6991 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1610.560949] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1610.577382] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1610.581768] audit: audit_lost=1121 audit_rate_limit=0 audit_backlog_limit=64 [ 1614.764901] kauditd_printk_skb: 777 callbacks suppressed [ 1614.764911] audit: type=1400 audit(1574201876.582:240547): avc: denied { map } for pid=7090 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.794864] audit: type=1400 audit(1574201876.582:240548): avc: denied { map } for pid=7090 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.821058] audit: type=1400 audit(1574201876.622:240549): avc: denied { map } for pid=7091 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.845691] audit: type=1400 audit(1574201876.622:240550): avc: denied { map } for pid=7091 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.871365] audit: type=1400 audit(1574201876.632:240551): avc: denied { map } for pid=7091 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.895726] audit: type=1400 audit(1574201876.632:240552): avc: denied { map } for pid=7091 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.922482] audit: type=1400 audit(1574201876.642:240553): avc: denied { map } for pid=7091 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.945451] audit: type=1400 audit(1574201876.642:240554): avc: denied { map } for pid=7091 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.973189] audit: type=1400 audit(1574201876.652:240555): avc: denied { map } for pid=7091 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1614.999102] audit: type=1400 audit(1574201876.652:240556): avc: denied { map } for pid=7091 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.771153] kauditd_printk_skb: 1002 callbacks suppressed [ 1619.771163] audit: type=1400 audit(1574201881.595:241559): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.801164] audit: type=1400 audit(1574201881.595:241560): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.829110] audit: type=1400 audit(1574201881.595:241561): avc: denied { map } for pid=7203 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.852252] audit: type=1400 audit(1574201881.605:241562): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.880883] audit: type=1400 audit(1574201881.605:241563): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.905789] audit: type=1400 audit(1574201881.615:241564): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.933895] audit: type=1400 audit(1574201881.615:241565): avc: denied { map } for pid=7203 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.959320] audit: type=1400 audit(1574201881.655:241566): avc: denied { map } for pid=7204 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1619.985266] audit: type=1400 audit(1574201881.655:241567): avc: denied { map } for pid=7204 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1620.007973] audit: type=1400 audit(1574201881.655:241568): avc: denied { map } for pid=7204 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad9", 0x65, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4050000000000006110500000000000a0000000040000009500000000000000ef83e09135342a7a853b5e44856a175ec0372e39594683521821944cb510ff0c74491f"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 22:18:05 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x7f) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000100)=0x2, 0xfffffffffffffda2) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41000088}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x200}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x99}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}]}, 0x74}, 0x1, 0x0, 0x0, 0x8000}, 0x8002004) 22:18:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd23}, 0x1c}}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r5 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r5, 0xc018620c, &(0x7f0000000000)) r6 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000000)) r7 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r7, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r7, 0xc018620c, &(0x7f0000000000)) r8 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r8, 0xc018620c, &(0x7f0000000000)) r9 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r9, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r9, 0xc018620c, &(0x7f0000000000)) r10 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r10, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r10, 0xc018620c, &(0x7f0000000000)) r11 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r11, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r11, 0xc018620c, &(0x7f0000000000)) r12 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r12, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r12, 0xc018620c, &(0x7f0000000000)) r13 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r13, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r13, 0xc018620c, &(0x7f0000000000)) r14 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r14, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r14, 0xc018620c, &(0x7f0000000000)) r15 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r15, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r15, 0xc018620c, &(0x7f0000000000)) r16 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r16, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r16, 0xc018620c, &(0x7f0000000000)) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[@ANYRES64=r8, @ANYRESOCT, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r9, @ANYBLOB="b158884690", @ANYRESOCT=0x0], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES64=r16, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES32=r10], @ANYBLOB="d648a84ac9c12ea09c415cb815e98214b31cb104fb363d72ea23cd569c6c4c350ebf4ff565c5864141be59760fe38c2d5af1178242fe7ad15ead7cb1db7069a1c5723f2544c1b540c45a2948af531d957222316223f3b51ae53068c2c4df000200004d171fec7fc37931d2a2d137a421410e95051f5109c7fe5805031532992b7014423664d94373992b000000", @ANYRESDEC=r11, @ANYRESOCT=r9, @ANYRESHEX=r12, @ANYRES64=r13], @ANYRESOCT=r14, @ANYRESDEC=r15, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRES16]], 0x2) fallocate(r4, 0x0, 0x0, 0x8020001) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000740)="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", 0xc00}], 0x1) socket$inet6(0xa, 0x80002, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) socket(0x0, 0x2, 0xc) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104fffffd3b000007110600", 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) 22:18:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfe5f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x686a5486316af098) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sched_setattr(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() sched_setattr(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getpid() socket(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000034c0)={@local, @loopback, @empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x1, 0x0, 0x0, 0x5}, 0x0) gettid() ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040), 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket(0x0, 0x2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x611c0f636005d288, 0x1, 0x2, 0x0, 0x9bd6, 0x0, 0x0, 0x7}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() r1 = getpid() sched_setattr(r1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000280)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) 22:18:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x60000008, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='loginuid\x00') r0 = gettid() tkill(r0, 0x3c) umount2(&(0x7f0000000000)='./file0\x00', 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') write$P9_RXATTRWALK(r1, 0x0, 0x0) 22:18:06 executing program 4: eventfd2(0x2, 0x800) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) clock_settime(0x2, &(0x7f0000000240)={0x77359400}) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, 0x0, 0x38b, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000bc0)={0x990e, 0x0, 0x0, 0x80000001, 0x4, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2007ffe) r4 = creat(0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000900)=ANY=[@ANYBLOB="64f8b666cbabaf2ee0aced116a09aa6cefa89e63754996d4096ffd84e783a11c19b87ed101fd30049bc53ae5d77551ba56b8366658b17aad385b", @ANYRES16, @ANYBLOB="08082dbd7000fcdbdf250d00000050000700080002007f0b00000c00030005000000000000000c00040000080000000000000c000300020000000000000008000100ff0000000c00040008000000000000000c00040000000000000000003800070008000200010400000c0004000e0a0000000000000c000400060000000000000008000200000200000c00030001000080000000000c00060008000100ff7f00001400090008000200000800000800010001000000380006000400020008000100010400000400020008000100f7000000080001000900000004000200080001000be03b4408000100040000000c00050008000100696200008c0005001c000200080001001700000008000300ffff0000080004000e0100000800010065746800080001006962000008000100696200000800010065746800080001006962000034000200080003000300000008000200ffffff7f0800030070000000080003000001000008000400ffffffff080001001c000000080001006574680008000100657468001c000200080001000700000008000200210b00000800020000000000"], 0x3}, 0x1, 0x0, 0x0, 0xaa353dff9f842f42}, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x28f, @empty, 0x2}, 0x1c) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000600)=""/155) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000000c0)={0x3, {{0x2, 0x4e22, @multicast2}}}, 0x88) 22:18:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000000)=0x1000) r3 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="24000000530407041dfffd946f610500020000001f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) getpgrp(r4) [ 1624.783030] kauditd_printk_skb: 653 callbacks suppressed [ 1624.783040] audit: type=1400 audit(1574201886.607:242223): avc: denied { map } for pid=7308 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) select(0x40, &(0x7f0000000080)={0x101, 0x1ff, 0x8000, 0x6a75, 0x1, 0x3, 0xfb7, 0x100}, &(0x7f0000000100)={0x0, 0x0, 0x5fe, 0x7fff, 0x5, 0x9, 0x4, 0x4}, &(0x7f00000001c0)={0x1, 0x1a4, 0xfffffffffffff1c8, 0x0, 0x0, 0x8, 0x0, 0x7}, &(0x7f0000000200)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000804000/0xf000)=nil, 0xf000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) [ 1625.087636] audit: type=1400 audit(1574201886.607:242222): avc: denied { map } for pid=7302 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:07 executing program 5: creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x40088) creat(&(0x7f00000000c0)='./bus\x00', 0x1c) utime(&(0x7f0000000000)='./bus\x00', 0x0) [ 1625.323891] audit: type=1400 audit(1574201886.617:242224): avc: denied { map_create } for pid=7288 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1625.373314] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1625.381085] audit: audit_backlog=65 > audit_backlog_limit=64 22:18:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1625.425576] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1625.434333] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1625.438403] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1625.453640] audit: audit_lost=1125 audit_rate_limit=0 audit_backlog_limit=64 [ 1625.462220] audit: audit_lost=1126 audit_rate_limit=0 audit_backlog_limit=64 22:18:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x1, &(0x7f0000000500)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) socketpair$unix(0x1, 0xdfa2f63543349640, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f0000000080)=0x8) 22:18:08 executing program 1: sysinfo(&(0x7f0000000040)=""/22) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000200)) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x1c000, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) r2 = socket$inet(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='dummy0\x00'}) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) 22:18:11 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_pts(r1, 0x300) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000080)={0x80000}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a54f) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 22:18:11 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0xc) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000000c0)=""/123) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="1c2436070000000000000000"]) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x0, 0x0, 0x401, 0x1}) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) write$P9_RLOCK(r2, &(0x7f0000000480)={0x8, 0x35, 0x4, 0x2}, 0x8) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400, 0x0) ioctl$TIOCLINUX2(r4, 0x541c, &(0x7f0000000280)={0x2, 0x400, 0xd04c, 0x3, 0xffff, 0x2}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000002c0)=0x5, 0x4) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r7, 0x1) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000004c0)='erspan0\x00', 0x10) fcntl$setownex(r5, 0xf, &(0x7f0000000440)={0x2, r6}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa283000c200a0009000100041d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 22:18:11 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x92400, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000200}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0x16c, r1, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x240}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x320}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x254}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfd5}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfd5a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) delete_module(&(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x800) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x4000) sendto(r3, &(0x7f0000000700)="9f75051db961b4556b2c68806e72a094d7666de65403c8f5c9008aa467191e8fbcaeb85cde88dc740e264749f4ce326e9787002929eedd4ed2128faacbc67bfb4e14", 0x42, 0x40000, &(0x7f0000000780)=@x25={0x9, @remote={[], 0x3}}, 0x80) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$TIOCMIWAIT(r4, 0x545c, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffff1, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000000140)="6f8e31c94c6db026340de4208bed2e1a708708ef8f37eade67a78feaf5b0e05fe857821c720d48237c77220c4e457b15515d5d2b4b7cdeacd10bcb48637ec6eda59ccbc7f33661a34466a04ff50a4660911d0384b6c4642873524f12b439f8c868c54851e192ee8740ec8943d5861ece8cb55ec000663f6fefc38a0859ec8f629e373d87d9f0dbd2e4b748473a5271043d02cd896c6ad8930a566d0fab81") sendto$inet(r2, &(0x7f0000000540)="c3", 0x1, 0x851f699a605d6ea1, 0x0, 0x0) getsockopt$inet_buf(r5, 0x0, 0x2e, &(0x7f0000000200)=""/76, &(0x7f0000000280)=0x4c) recvmmsg(r2, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)=""/146, 0x92}], 0x1}}], 0x113, 0x1cce1, 0x0) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r6, &(0x7f0000000300)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r6, &(0x7f0000000d00), 0x400004e, 0x0) r8 = open(0x0, 0x0, 0x0) writev(r8, &(0x7f00000001c0)=[{&(0x7f0000000000)="6dd56f6ae6ea49478c44", 0xa}, {&(0x7f0000000140)="e9b112fbb28b435e4fa52aab3f62df9d6de5d9899296f554145363", 0xfffffffffffffee6}], 0x2) r9 = dup(0xffffffffffffffff) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3b) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r10, 0x0, 0x0) r11 = syz_open_procfs(r10, &(0x7f0000000840)='coredump_filter\x00') ioctl$EVIOCGEFFECTS(r11, 0x80044584, &(0x7f00000009c0)=""/162) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r9, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYRES16=r12, @ANYBLOB="000028bd7000000000000a000000380005000800010075647000240002000800030053ff0000080001000c0000e9070003003f0000000800040000"], 0x2}}, 0x8800) sendmsg$TIPC_NL_BEARER_SET(r8, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="08010000", @ANYRES16=r12, @ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x40c4}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000940)={0x48, r12, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x24021900}, 0x60000) 22:18:11 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="b4000000", @ANYRES16, @ANYBLOB="100029bd7000fcdbdf25030000000c00040008000000000000000c00060001000000000000000c00080001000000010000004400070008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="080000e3", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08001100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="2658a7e5a2ad41d657c2a59302d3b815d763063fd056ef2b3d68858f278340dcd2754e31905ddb31a2d4f94e9ed9b7f2aaed846d6ed0106f52fa5883ef465ff03759328ace2fe2151f5d973e1ed2eb5520a097b8ddfdc57716a91c21b29d20e7e47ab1a0fadd65954d72ad38a4ea04cb5b7127ae017059b4619dd24dcc9f6d82534e2512279c5758453bf05e39b609edd0316da79325374791cd0d317dc14fb2aaca"], @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100000000000c000200018000000000000008000100000000001c00070008000100", @ANYRES32, @ANYBLOB="08000100", @ANYPTR, @ANYBLOB="50a5ffff", @ANYRESOCT], 0x18}, 0x1, 0x0, 0x0, 0x2ea6532f79c59af3}, 0x40000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={r0, 0x0}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 22:18:11 executing program 1: getpid() sched_setattr(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400000, 0x0) r2 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/create\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000940)={'syz1', "16f2564d88801bdee7420e97fd1d2960e5416b7e3ce54bb63ee313e4f46a1ac9212bc48dc39657dcb2babbf83e1370b12fcaa760fdf9ac4b1156303aba34bcd760d4eee36d2b46d0f925d85ca5b3138e588a64b71005ba4e709e3a2725c77e128c29c7196453b9513467ebbac562cbacb7e220b3c12c0bb5452d632d28a916f8eae029fb75720bdd013e6c0ba616b9d27ef2c3c024b26707a670e049c32c1fb0a087b2dcb3aadf4cc1d0c8e20b423a313b44de15a48b7b03ab107485e9c5f71cd56f1c6fc9d47939ab41291bb0104c9e00a3bdf1586bf5c3b3473c89e808c2fa16d1a2fd91fcec7ffd1131c96e992811a769d409c541f81a84f6900c6b700365aef7903c919322c5016023ec64038cff76a3c63ee6bad475e6c61fafb7c81d2b45e2540e58f245fa7c64c67ea12cbf19f8007a5d4285e8ad19f829181e01596c57d484b32f3b180d99f7014601499749696f2dfc0d5ec923c24d82db5f3ba86f217b4c079d21cda221c213843c3f35dee5ed82a73f37c10407aaeb0518b21a62de086d47696df888688c0697dba07d18d961813b7524e639ed12cc115d6a5c34301d462e86c9be2e40e897a66056cac54799cb4c9b6f4967e943fba760516678066815c646020f32346cbf885c5bdecaa319ea9562be5bd09f88e6598f7bf4e7ce69b10db9ae0838ab387393fb2794c3a443fba0e5d4a77cec68c19aee298b004d2708e09d7d2b965cefa34de052a05e51102b49f5048ab0bfe8773e0bf6ecd761bf58667857d02b9d30a3bdd796244f262ea8d7b4a6495bba19e4ae8d8b1497ed312ea9f8c94c7951b00ba135d05929b5b39af5ea0de762d408f4965be879ad3cc0bdb67d283db166d0e480f9889b8db18cf989ece9d70b8534a707ef56095609a97a463e971474bfc3a329188963492c85696b4116b90ade98c7c0cb9778deedc844ef67bcf5df5ec56e72c570f9b4be94d5563441172fcd7b10bc6dde6957ef0fb22fa054c07dced4fdc0092bfe1e5a261bd7f352b75560979ae7317253c9abcd1560076e9c5c0f0c948c70494e73d9922ad6bf20b5aea88c8236c01ad7354a5720ae4ac421694cb44accdc295bc6442b3cac6c1981d7a7d1748c13d86e75ce6e7ff51d6e3e36f2e803284f5795ed7b1eb0b1d26d1a8472d9ba8bc69a903b21c92c39d3a026466dece35248b59dbc01c13af4ebf1e3d070e1bc77113935072145ef2b890dd2e8c3f8f45999e7e7ef5102fea370519e237785809b4816b4e170059b527b32e3546f4bb34834af7001578306bccb27452d6de8dcc12a71f5bb1db13998a75a235201dfdfc90962e1e24e1ac4524e31e0b72ce1a1cdae6de01a300b9b727802e339f2e0004cfca2bd4e4471b6f2676159c828b9d91673238ddc27c86e8544ebda20e1662f7588af8b2d2a2d098a85eea78a6fdc1df1f7cc7e7e901fc0b09f7e4ff6974033e28d8bdf1ecf16a3bb1d942c0aac475baa1d43a1612f5af283ae7b4bb5446759d0e7f2a2128fb803e1b4783fddbed84293a3443f64572d2c695fdaa6c6bce56db5b25b5d357f1c69110e7b1c12af2e86d27cd3b6eae309a1d872178740bf132e9dc9b29887184d8ee53013bd92d13b37004f86bf49afa96977fa407d3c531a4257326d66da1018dc4ff9c48e9e6e54fa40d448475d33862dff8617a096de798a1191849bab6eb8a623a68ebdf85bf6763bb183101da20bd0417b8be2468811619a5649fa91a72994885b500d696e99e8f0a305f9c6f8bfb7f58a7cd5188ccbe2f29fd76db9619033b09bfdf5b9b8a927fb0d018d78f66f1c71477ace064fdd4fe262f0813c126576f5f1b7ad1c71a8fda0c1f7e2ce2e81464310de12fadeaa0865d61c61fb884b31e5d566d1ac4ddf4f8b433bbb4ee0a4190b5050d54ee95365b2ddf1b718f68203eb8a15894f523f1c2dcf8a90a88c9fcbb4d62fe469c6fafa62fbd79afb1620b60ef1f3ef2f12349f4175382866f59742ac536e49b07bd4638657e5743b68605b3be414c4ef150da608f1c3a888a33c52b0f01f0bfb8a52a642f67105491e6d7b19f169e810779bf09b4ac78cbcf05ee42f31797681f1504f102399726120a1af409319ae5acb08acaab10a2b6a97427c0fba3fa47db422e11da01307514aff7b831ccfaa4201688d0d6395928a6a9a29db0bbf50f7989872305eeee3db92bac16aa22732fbe8f1abfd4f430bb148aed8eff7d5f19ffd72f5f9437e452740e474aea569a73ab4b8c07b8964f889c3f6d075d1b086b2137c54d73ace69e57bea2f9efaf7da442b06455d7f5b6f4738b732a369d90b218f8621aab9afa95fbf305be848023990b122a518a59c39c95508a3658a3da833966c058733184ab71ff979f625934b0889be6807ca9749cb6894c9ba168ada81d583c258634ff828a40d4e602b0d31ba2910242316ac5ce852c046ed3079aaa824a538b94ee24fa4097f441443ee0c47bd28509f96e2e2220b8918aa81105602750d60df1717e53b83749275d448dd13d2af63b666e7703ad778ff029abd6589bc8b791f91fe40014211bed069c9b8abed0fd323b36e0c86e763fc3cf5856eba0c498c02474ad4b2dbdc36333f043e5f38e56398fe3d453ee6f8d9fe2b7b81330696aa6052f61e5a19f7a66c73c7693f5c3a7762d9c8475f55975b7619c8fe2a227ae8a74d019882adaeac245a16f57dc98d26e2a19c7ed7e106746bc75afd183aba887b340798c11486ee79cc5beaf613e5f748c2ee662b5b3804c946fae2345cee7146f882b0404d6c8054cf9fda2dc0f2b092e2f4f785c870c124901077f8b524731ffab0a7730809ce37e11fa8bcdcc3e7aef17649453b4b2c97838d9f871c20afa8840b1e4a8266c5fdbf45006b101b1652a2c09f8978d5248295e044686578f259276b308fa85391f06b83cddc24ac26c4e61dbb31602641ef49e04aa9fc3d1ff6bc26d02d2796a38f56a4e039c3b9f33d0d72b56cf558ebf173e482f3811a0203ab058e8f3d627bf6cdd5be829b93a40ef6e58189f543d2b22bc3be02d8ce6bd651bca3d9191602fe9e4bc4e61bce7838ea59b3e131859da3f94bb6f3f0be866a61e6c3bebb56b41ad46e95b1d1fb3511df2d905cb8e5fcbf29530efd7267bd32172bd4e2158bd7fec1213f0d3ba14cf0a268cae8f7800fea2ddac169b3e29c6a418b54b7b623590a26caa0291b5a3c18bc347afd7cac6e587589533f28e24a1ac63c2d683eb541512bcf96284585277a3fced786df4c21db889ac7d5eed37379a19be84496c635508fc79a6d78899c080584538350ee40c169152bf1825d6575a736c1c4b1a43b84de552707d24ddcb6d99f49dbb74040249faca7554723980b55f3ae38e087cec03a51f854a3e4d068ea1c4066073c6416b3335e7a0d15b2350d37e7c49ab3133c7be36fac12abf21f445e428a3d1553f8840d06d130a7d1bf82bf0c8fbd68b9dda838abeed8535785a7a625aab69555e09556a19c487c5c8808fe88aa545f516f8693936a38eaca96fa5e8a2a7a7102f1c7c04b6288234999f23beb7797a3a56a0123588af7dac53d06bf6235bd2a8f206423e3dbe3a3d5712054f68f846a253bb45f806625202b0d092d6889a1437e884b0d04f217b6cb20fcef0e25f35fa0f17b62c788c79f65566d9921b0b558eac66007bf5092eba997b9adf75b8d1f2621e112d208b5690b57ebf17bfd10dd3cbf127ddd442881f561c2f7eacb427c3dff6a9f18b7715d753bcbf57c260d050963a07eb95dcd953df8d41bace8b9992dd099810f832634da9953c86947ebdba35c1cc58d6be931a2af46148b6a21e0a5a99d6547c98a24e5de32372c01e7a9592dc22b2b2d09db56038b3636620d328c23b554d83d2fec8b526d89877ded26117c3345966b39a4c01b539e38a4407c70a13c8ba66731005c33f3a51c1cfd35479fb6b71648497e452624c97d1e8c7245638ffad5b4d719b5b59fb1b0ae74802a4f8ec25df2cee3524238de0f7e1579413fa98b1a3f9463a76d89c6d806a60249cdcc3ccc7b6a6309a6e2c150d7d30e6211900130dbaacf0466cb34aa7307fc789bab3452fbea0083d2941959b9b2512f678fa9a623c94ffb3530997ec9186358c5993275068ae5d616d7b33a13ec4356992a3bec31e7699e437d279ffcd6fa5a97e6c57392e08ca982cf158d1aeb276081b244cd5fb8c6e87b4f8ff042aa6105445644ba8eec232f3ad1e06f0c88b669947eba7fce11da44411fcb9c3e9f72483f5614cee553e2229889554e213000638c60a2f1a8162bc40579962975ba9475f4ae425dd70f02c0def3ff35d984b712f0d761a5ef9ba003eccd497434b4e252dab931961d3133a1bdb3275b040dc5f0b0e3212c95dd98794da1c30889ef176a0900f5eea263ddfd99a8743e6fa94b6d4af124c7c3562fa00f6644f70d02632fc73573dd137e7f4025bac1c32fde2d372cfa2c9b771b150d8dfffca2fbfc31da7b74939bbed99470f7253fbe7129b854d42761ba3ca6f03b44b0f863ef6bd609b6a0ea8b7e1d910158f174832c1bfc1b3ba9b8cd29fbebe494734b129df828e673ff8f88f5e0ae28aa73395b33bee76170e46efb2cec625ffb2f4e067d129119091238174d644fd2185cccb455d7cc42e2c16698f51a2d7b7561f29c39fdd35d7f52ee0edad9b9da0a1a04004a565f3d1259f50ce7fcf4e1f2151f001c82dee4d51b038eafcaf1a38f2203ab82664005082e926ec609bc860f473aa4492b1f4224f5798c653a9eb4cdecda67480660b8a795a65c1fa3bf11f13fc4913ba4f1ea2301086c10419b55c5d9e363847f48c6bec20a28b52c3335e0d66b7037af087dc5ee571e6a5a6e58466b0f7ab7743e7183068fd330228102f9befe45647473862011f3dc24a0b0971d0500d037fdcde89ab8d1c5354e21f7cc8c9ce88b289497c770fbb4b8297fbe78aecd04c5ef288f761ca6b35145dce45844f203739617adfaa25a758611c37836ae6961f3c0682b4444fe6affb602935040fbc88a4f326329a734f87882c3af4b8bee0d88605e550fc3204dc7a0c235299a0a46abac5ca493561484f80b2c2eb3d3852c88d2ec72638f9ad2a0890f33c35bbf424bf4af805b1cfd78c1a82b540f64955cd54a8eaba3c6e721a391fea42d63155021dd7b5467e9f27e6b22639e04f0749e16f2b7e1c285a7f708b14588230e4e181766d22280ef582759e8cef1e90732707efda0b960e71bedfc02d4bcfa0973996acfde487178f532370d201baa6efc6defb0e1bd7745d8b7335441c0fd62fd0ed39a2c951d0e96e444b48e47b28e4fcbc6b95fc092f30c73cfce370cbd7550c801f6c9a30409b8658ce6b6d40a9702642c2cebebd45c5d971b764d07292f1258cccac91fcc2ecf7d8790b85a84c4c328e4876b6e0de2755df364675823969d8c06b047d1559f4b152e76c86da863f63d05920ecc89025240705a6a275d01da023e1aecf5859ba7e836f05c288f900f141a17369141c2b5f292ef24a1b50200ce5aa8a70efe91d4c1fb5d6c08be326360a6811a8eae5cf6da7a5f0356b424f19120f4d78dfcc61457c2fa55d5ab27b9d07f576bda51125d1e30156fdd3824ab7b9b9d3fc4afd97480289bb6a1a8d571bc9fca8885dd17d514d5f61e115a6fff3812e09a05bf7fb1e9f8ceaa069ae1c5818e1b61eb5728364b1178ea6f1d1dff877bcf3625aeea1276cd3e277d77cdf0083c40674da993dde8880ee8af9208dd67d89fb20cfdc8388137cb0d6b0d2aff4a569ab264d89df404cba98884e721ad4f50"}, 0x1004) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000800)={0xac, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x1050}, 0x880) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0xfa44bb498b67d844) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) sendfile(r3, r3, &(0x7f0000000580)=0x8, 0x80000000) unlink(&(0x7f0000000040)='./file0\x00') 22:18:11 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="2ca61e8d14a3633d105d34a67f10345284b30a71519005aa51c7be15960c232b399121f792d34ca6b5c1c9a360bdd4894979971abb05b4ea00c824a94186"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) io_submit(r3, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair(0x9, 0x1, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(r4, 0x1, 0x24, 0x0, 0x0) 22:18:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000280)) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xfffffffffffffd8c) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x8080, 0x0, 0x0, 0x0, 0xa48f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x1ff, 0xdb, 0x2}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, 0x0, 0xfffc) [ 1629.794418] kauditd_printk_skb: 243 callbacks suppressed [ 1629.794429] audit: type=1400 audit(1574201891.620:242430): avc: denied { map } for pid=7372 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1629.896391] audit: type=1400 audit(1574201891.660:242431): avc: denied { map } for pid=7372 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1629.984372] audit: type=1400 audit(1574201891.660:242432): avc: denied { map } for pid=7375 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.087118] audit: type=1400 audit(1574201891.670:242433): avc: denied { map } for pid=7375 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.186387] audit: type=1400 audit(1574201891.680:242434): avc: denied { map } for pid=7372 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) rt_sigsuspend(&(0x7f0000000000)={0xfffffffffffffffe}, 0x8) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d734c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca00000000000000", 0x600) sendfile(r0, r1, 0x0, 0x10000) lstat(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 1630.280715] audit: type=1400 audit(1574201891.680:242435): avc: denied { map } for pid=7375 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.418903] audit: type=1400 audit(1574201891.700:242436): avc: denied { map } for pid=7375 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.545167] audit: type=1400 audit(1574201891.900:242437): avc: denied { map } for pid=7379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:12 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x80000, 0x7) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) gettid() r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb7c7486ba6e92c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r3, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="2b1b34878f571d08000000c50f8512d07fe21aa0c499cdb9165c36aba9207acb8c33f67f492d53ebb350731841b4499a20898b8aea15422bbeec401f40c6a37622816f0a5d9668aadcfc764d0a90947f5b2fa50efcdbbd22234203f18cb2e8d62061dbcddf9b8317381508c7fc8a9cd315d338a8a3de0bfd7f"]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x299) shutdown(r5, 0x1) fadvise64(r5, 0x0, 0x7, 0x3) recvmmsg(r4, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, 0x0, 0x0) [ 1630.696344] audit: type=1400 audit(1574201891.910:242438): avc: denied { map } for pid=7379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1630.785968] audit: type=1400 audit(1574201891.920:242439): avc: denied { map } for pid=7379 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.795298] kauditd_printk_skb: 500 callbacks suppressed [ 1634.795307] audit: type=1400 audit(1574201896.622:242940): avc: denied { map } for pid=7455 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.825551] audit: type=1400 audit(1574201896.622:242941): avc: denied { map } for pid=7455 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.862506] audit: type=1400 audit(1574201896.662:242942): avc: denied { map } for pid=7456 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.897021] audit: type=1400 audit(1574201896.662:242943): avc: denied { map } for pid=7456 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.920491] audit: type=1400 audit(1574201896.662:242944): avc: denied { map } for pid=7456 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.948208] audit: type=1400 audit(1574201896.662:242945): avc: denied { map } for pid=7456 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1634.975297] audit: type=1400 audit(1574201896.672:242946): avc: denied { map } for pid=7456 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1635.001627] audit: type=1400 audit(1574201896.672:242947): avc: denied { map } for pid=7456 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1635.026464] audit: type=1400 audit(1574201896.682:242948): avc: denied { map } for pid=7456 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1635.056542] audit: type=1400 audit(1574201896.682:242949): avc: denied { map } for pid=7456 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.804955] kauditd_printk_skb: 1003 callbacks suppressed [ 1639.804963] audit: type=1400 audit(1574201901.635:243953): avc: denied { map } for pid=7568 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.833072] audit: type=1400 audit(1574201901.635:243954): avc: denied { map } for pid=7568 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.861150] audit: type=1400 audit(1574201901.635:243955): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.885486] audit: type=1400 audit(1574201901.645:243956): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.913301] audit: type=1400 audit(1574201901.645:243957): avc: denied { map } for pid=7568 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.936315] audit: type=1400 audit(1574201901.655:243958): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.964780] audit: type=1400 audit(1574201901.655:243959): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1639.993104] audit: type=1400 audit(1574201901.665:243960): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1640.018649] audit: type=1400 audit(1574201901.665:243961): avc: denied { map } for pid=7568 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1640.047373] audit: type=1400 audit(1574201901.705:243962): avc: denied { map } for pid=7569 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1644.809505] kauditd_printk_skb: 718 callbacks suppressed [ 1644.809514] audit: type=1400 audit(1574201906.647:244681): avc: denied { map } for pid=7655 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:26 executing program 1: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)=""/72, 0x48) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'system.', '],\t\xbb-wlan1\x00'}, &(0x7f0000000180)='user.syz\x00', 0x9, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000200)={'syz1\x00', {0x64, 0x436, 0x7, 0x6}, 0x2f, [0x7, 0x0, 0xdba, 0x64, 0x49f1, 0x1, 0xffff, 0x0, 0x6, 0x5, 0x6aad30fe, 0x7, 0x7fff, 0xffffffff, 0x549, 0x5, 0x2, 0x100, 0x2, 0x0, 0x32624988, 0x9, 0x4, 0x9c8, 0x9cd, 0x2, 0x9, 0x1a26, 0xff, 0x4, 0xe907, 0xfffffffa, 0x9, 0x6, 0x57, 0xfffffffa, 0x8, 0x1ff, 0x8, 0x8, 0x46b, 0xffffffff, 0x100, 0x10000, 0x2, 0x8, 0x0, 0x800, 0x4, 0x5, 0x8, 0x7ff, 0x5, 0x1000, 0x400, 0x1, 0x5, 0x7, 0x800, 0x2, 0x0, 0x5, 0x9, 0x20f0], [0xffffb48d, 0x746, 0x9, 0x8000, 0x8, 0x6, 0x1, 0x3, 0x101, 0x5, 0x3, 0x7d0, 0x5, 0x10001, 0x9c, 0xfff, 0x7, 0x1, 0xffff, 0x20, 0x100, 0x10000, 0x5, 0x4, 0x8, 0x7, 0x2, 0x7, 0x9, 0x6, 0x10000, 0x8, 0xf, 0x1f, 0x8001, 0x9, 0x2, 0x5, 0x2, 0x0, 0x400, 0x8000, 0x0, 0x800000, 0x10000, 0x7, 0x2, 0xfffffff7, 0x81, 0x1000, 0x2, 0x47, 0x2, 0x2, 0x1, 0x10000, 0x80000001, 0x2, 0x2, 0x400, 0x8, 0x0, 0x8, 0xfffffffc], [0x5, 0x6, 0x8, 0x8, 0x80000001, 0x0, 0x1, 0xffff, 0xd9, 0x4, 0x2, 0x5, 0x3, 0x80000001, 0xff, 0x1, 0x4, 0x4, 0x0, 0x0, 0x0, 0x5, 0x101, 0x4, 0x1000, 0x9, 0x5c7, 0x36, 0x8, 0x2, 0x9a7, 0x401, 0x400, 0x345b, 0x100, 0xac, 0x8001, 0x1, 0x3ff, 0x0, 0x3, 0x5e, 0xdfac, 0x45cea8a6, 0x3, 0x3, 0x3a, 0x7fff, 0x8001, 0x1, 0x2ddf, 0x1, 0x51, 0x1200000, 0x101, 0x0, 0x0, 0xc00, 0x2, 0x1, 0x6, 0x7, 0xa14, 0xc2], [0x1, 0x1, 0x80000001, 0xb12, 0xfffffffa, 0x40, 0x3, 0x1, 0xff, 0x1, 0x9, 0xbf57, 0x47cb48f7, 0x2a7, 0x10000, 0x80000000, 0x6, 0x80000000, 0x2c7, 0x4, 0x4, 0xfffffff8, 0xff, 0x6, 0xffff0000, 0x9, 0x0, 0xfe, 0x3f, 0x6, 0x9, 0x7, 0xff, 0x81, 0x4, 0x3ff, 0x8000, 0x5, 0x1000, 0x7, 0x2, 0x10, 0x9b, 0xbf6, 0x6, 0x60916b2a, 0x1, 0x8, 0xc3, 0x4, 0xffffffff, 0x100, 0x3d, 0x9, 0x5, 0x953d, 0x5a06, 0x1, 0x5, 0x7b, 0x8, 0x4acc, 0x5, 0x8]}, 0x45c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000680)=0x0) rt_sigqueueinfo(r1, 0x2f, &(0x7f00000006c0)={0x3d, 0x1ff, 0x7fffffff}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000740)=@x25, &(0x7f00000007c0)=0x80, 0x800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000a80)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000880)={0x1b4, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc24}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5f09}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x767}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6a8ff0cb}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd05}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x10}, 0x28040) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000ac0)) r4 = dup2(r2, r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000c40)={r4, &(0x7f0000000b00)="5e74b8c2488e09e95d47912df998cf8742ba323b441c894e8edec4a754c4c969f39c283dd65195c4e1b45184e9766d9f262f74c55dc232ee041903683546d5dd57ee8cdf4c7b3966331dc9cd262efbac42f492554ff5e8a4c40b4abcffbc22439df0695d0a70c63b77b8d9619cf5fc83f3f6c5738420414a7842fa67dbba631e42b3fe107114f503fcfb9dd44ec838a0f64e7eb669436f5ce5519f26fbdb78c9c61f38558c4c5b954dcdb698a15a2f92d914cc93dd0ea7d5e938d6f1ffe037890eccc2bd5b74d5f0ff4fc80d033a1d4490c7707f4e945afda48de87fe4d60cb2451413f7844c34", &(0x7f0000000c00)=""/50, 0x6}, 0x20) r5 = dup(0xffffffffffffffff) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000c80)={0x0, 0x0, {0xc, 0x10, 0x16, 0x18, 0x2, 0x4000000, 0x4, 0x38, 0xfffffffffffffffd}}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000cc0)='./file0\x00', 0x200, 0x6) sendfile(r6, r0, &(0x7f0000000d00)=0x2f3, 0xfffffffffffffffc) listxattr(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)=""/152, 0x98) prctl$PR_SET_TIMERSLACK(0x1d, 0x101) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000e80)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r8, 0x506, 0x70bd2b, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x21}}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x2, 0xbb, 0x9]}]}, 0x40}}, 0x80) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000f80)=""/59) r9 = accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x81000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'vxcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000001080)={'vcan0\x00', r10}) r11 = open(&(0x7f00000010c0)='./file0\x00', 0x80, 0xe) ioctl(r11, 0x80000001, &(0x7f0000001100)="4ff34396dd14333d0ed45ba70c37c1f12d3f8dc4a4cd743896bea45b46a8df763081c7d411315d") keyctl$session_to_parent(0x12) r12 = socket(0x11, 0x80000, 0xe5) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r12, 0x10e, 0x8, &(0x7f0000001300)=0x6, 0x4) 22:18:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf35, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000100)="5ad6e6d9cedc1249b9296b9acaae1a4b00eb12ec2d57fb832b4e1ba1886518e304d39f6880a3b3c56a7db44679ff114ef88d8dc6c8b3360ed66b0da78a47bcaa3fb2d16d565a8337a283f65ce393c4484e09175022d985bbf37ab7f586f55b7a8908531c2639e9c4efc146e8ef1002d495f1fb5e3a9856056eb6f0a36ec33053", 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 22:18:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010003b0e000000000000000000000000c6dd5cb0743466100c8d04601256d8dc95b077fbc01e0b5f293bfa9ead37fd66446c9a5c870480d668f5b246e17ea45514297fefffd88c44bfc230ed3885140dbbf4bf9a6f56af6cc90c9a1efe632bc129d88b4a80a1c8d2b8c25ec5a0475ac8de304d4e3f73", @ANYRES32=0x0, @ANYBLOB="00000000000000000800200009000000140012000c000100697036746e6c000004000200"], 0x3c}}, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0xdad4d6fd181593c6, 0xffffffffffffffff) write$P9_RCLUNK(r3, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) 22:18:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000040)={0x20, 0x0, 0x3, 0x2, 0x1, 0x43, 0x20, 0x7, 0xff, 0x1000, 0x6, 0x7}) r6 = dup3(r3, r2, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000180)={0x0, {0x0, 0x4}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ppoll(&(0x7f00000000c0)=[{}], 0x20000000000000d8, 0x0, 0x0, 0xfffffffffffffd6a) 22:18:26 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f00000002c0)={{0x0, 0x0, @descriptor="8b34205153b262bb"}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000180)={0xff, 0x4, 0x5, 0x4, 0x1b, 0x1, 0x9, 0x1, 0xfd9, 0x45}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x0, 0x0, 0x80000001}]}) syz_genetlink_get_family_id$nbd(0x0) dup2(0xffffffffffffffff, r0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x2, &(0x7f0000000500)=[{0x0, 0x0, 0x4}, {&(0x7f0000000340)}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6158066f5f64615f616c6c6f63070000003030745f6d6561737572652c000000000000000000080000000000000000000000003c9146f801fd41c5c8833925edfa6841a1d62d724dc690d8583e40bf2381e34e291aa2b37fb701a56efc117fe53f1c1aeb0a91989421237c1bb07c7104b7465d421f7f3b30faea88848b3bda54"]) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000000)='./file1\x00', r2, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x6, 0x80}}) [ 1645.070474] audit: type=1400 audit(1574201906.697:244682): avc: denied { map } for pid=7655 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1645.160589] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.161630] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.172689] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.180481] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.188343] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.198891] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.199241] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.208704] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1645.335177] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 22:18:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1645.600628] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 22:18:27 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x3, 0x0, 0x0, 0x20, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') socket$inet_udplite(0x2, 0x2, 0x88) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0xfffffe38) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000440)=""/160) getresgid(&(0x7f0000000700), &(0x7f0000001d00), 0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000ac0)) clock_settime(0x2, &(0x7f0000000240)={0x77359400}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r3, &(0x7f00000017c0), 0x33c, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000bc0)={0x990e, 0x6, 0x3ff, 0x0, 0x4, 0x8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb0100180005d848a28d0eea6ec8d36fdf99b3286e9f4669247aa84300000000000028000000280000000b000000000000000000000805001f5694f10700fdd889380000000048003105820a000000000002000000002b9d158ac51a73f16d3ad10bc7388b69ca3350f0b50f052e3de58df96f8c2453c4eaf9458b2c75e2fa496f5082c4aa05abad7a8a81a78ca6cafae14764aa6a43c12761b4df9e7c5c3fde20f30a00000000000069066436445bbbdbbcbab8796ac7a79b4d174a79b06056703c7fbd79b5cc2ffbdae1eec595220562f376cbc1feeb"], &(0x7f0000002e40)=""/4096, 0x4b, 0x1000, 0x1}, 0x20) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000c00)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb') ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000380)) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) open(0x0, 0x143042, 0x0) 22:18:27 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') socket$inet_udplite(0x2, 0x2, 0x88) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) r1 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) getresgid(&(0x7f0000000700), &(0x7f0000001d00), 0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000ac0)="cd06d660b6f2b73bbc496ec2919bd1bb32bb00c20350be208e9b3bd9df84fccf3fd4c02b3031447c1bc9eb43b05e17b780ac161f588334683f2c0c2e426460ef95f88b9c577aa2b58b54d74d6e0c0235108611a2f2c95fa5cae987dc27c0f7398dd5bdb14f8e847f19a209b96905b45f0732b48e1d321b009dfa5cd4b50ed3576cef06ec7e4d39876af5b474f035e87d8dc9db8b69390c0c4e1da806631c684475ad202f84949a4c6952e077c6") clock_settime(0x2, &(0x7f0000000240)={0x77359400}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r2, &(0x7f00000017c0), 0x33c, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000bc0)={0x990e, 0x6, 0x3ff, 0x80000001, 0x4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xc, [@fwd={0xa}, @ptr={0xe}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x5f, 0x5f, 0x30, 0x0, 0x2e, 0x0]}}, &(0x7f0000002e40)=""/4096, 0x3c, 0x1000, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000c00)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb') r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x2007ffe) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$GIO_UNISCRNMAP(r4, 0x4b69, &(0x7f0000000600)=""/155) 22:18:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fdatasync(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0xfffffffe, {[@lsrr={0x83, 0x7, 0x98, [@local]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @loopback}}}}}, 0x0) 22:18:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x4, 0x3f) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 22:18:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ffd934aa54cdfc1795b921"], 0xb) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40040890) 22:18:28 executing program 1: sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xbe199e0d447a8e42, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="fe9946d9ea03000000000000006d93d634f56245", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c4}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'yam0\x00', r1}) 22:18:28 executing program 3: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x52a) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000200)=""/39, 0x27, 0x0) getegid() close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0xfffe, 0x0, @mcast1}}}, 0x17d) setsockopt$sock_void(r2, 0x1, 0x1b, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="28ef0000100057baffffffffffffffe3000ea788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) 22:18:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/87, 0x57}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f00000004c0)=""/155, 0x9b}], 0x4, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) 22:18:28 executing program 5: syz_open_dev$sndtimer(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) creat(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_int(r0, 0x0, 0x100000000000005, &(0x7f0000000080)=0x8, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004cc2f57c1c75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000029cc11ce043098b7939b912e7bd8c5004acf53be3ea114ff2047eab21d3fd7044bacfc39e0e6a2697029692400a88625427fac8f24c19e086ff689429343cceed49bfb10125e71cc5f3d852cffd10efbbd7774a7b9d318a688fcd62779d29458de9c2afd4c965ee02ee994fb40cd9355a5e30eecbaecbbd348906d47990d11fd024c856da2fd37dd3843494d72c5126cf3a4fbecf2193e16f38a5c3d1c564e38adb6ad3dbc710cd2"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) fcntl$setlease(r1, 0x400, 0x1) exit(0x0) 22:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000140)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x1f, 0x8, 0x200, 0x7, 0x7fffffff, 0x4, "55f581abc3d9549a6050e9bcfa27cc1074f8b635bbb1469a0046b73567cdbe"}, 0x137) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x30}}, 0x0) 22:18:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x14b442, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xa9) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r2, 0x0) msync(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x6) 22:18:30 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000340)={0x0, &(0x7f00000003c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r1) write(r2, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000080)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:18:30 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) fadvise64(r0, 0x7, 0x8, 0x4) fcntl$getflags(0xffffffffffffffff, 0x408) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f00000000c0)="1b0000001e005f0214fffffffff807000000000000000000000008", 0x1b) ioctl(r0, 0x1980, &(0x7f0000000140)="4be8d4dd67c80bfee1aa2abfded42cdc174834d5596e4089173f1513553f0bcd65d6535a436a9c590c6cdca31493a808c4213c1156dd4cd7e78768c1b4fd83c26ac10d2041c749704a9ee32c733fd9e2630c38ff05d3c747dfe003c81ee786561e773115719296d3adf35a362aaff422b506c49178e73de1c773c7c1e40d") 22:18:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f00000002c0)) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000600)='bridge0\x00') fallocate(r1, 0x0, 0x0, 0x2000002) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) fchdir(r5) fallocate(r0, 0x0, 0x0, 0x110001) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x20000, &(0x7f0000000440)={[], [{@smackfsroot={'smackfsroot'}}, {@obj_type={'obj_type', 0x3d, '/dev/vga_arbiter\x00'}}]}) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000100)=0x24de, 0x4) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r8, 0x40106614, &(0x7f0000000200)) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x200000000008}) [ 1649.828250] kauditd_printk_skb: 383 callbacks suppressed [ 1649.828260] audit: type=1400 audit(1574201911.670:245005): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/root/syz-executor.0" dev="sda1" ino=2339 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1649.983228] audit: type=1400 audit(1574201911.720:245006): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/root/syz-executor.0" dev="sda1" ino=2339 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1650.060023] audit: type=1400 audit(1574201911.790:245007): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/root/syzkaller-shm401339173" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1650.144875] audit: type=1400 audit(1574201911.790:245008): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/root/syzkaller-shm261656128" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1650.212280] audit: type=1400 audit(1574201911.830:245009): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1650.264856] audit: type=1400 audit(1574201911.870:245010): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1650.291609] audit: type=1400 audit(1574201911.890:245011): avc: denied { map } for pid=7782 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1650.364817] audit: type=1400 audit(1574201911.890:245012): avc: denied { map } for pid=7782 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1650.425021] audit: type=1400 audit(1574201911.900:245013): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1650.485411] audit: type=1400 audit(1574201911.900:245014): avc: denied { map } for pid=7780 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 1654.838157] kauditd_printk_skb: 912 callbacks suppressed [ 1654.838166] audit: type=1400 audit(1574201916.672:245927): avc: denied { map } for pid=7874 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1654.892498] audit: type=1400 audit(1574201916.682:245928): avc: denied { map } for pid=7874 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1654.935466] audit: type=1400 audit(1574201916.682:245929): avc: denied { map } for pid=7874 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1654.982498] audit: type=1400 audit(1574201916.682:245930): avc: denied { map } for pid=7874 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.032419] audit: type=1400 audit(1574201916.692:245931): avc: denied { map } for pid=7874 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.084580] audit: type=1400 audit(1574201916.702:245932): avc: denied { map } for pid=7875 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.107627] audit: type=1400 audit(1574201916.712:245933): avc: denied { map } for pid=7875 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.136322] audit: type=1400 audit(1574201916.712:245934): avc: denied { map } for pid=7875 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.161752] audit: type=1400 audit(1574201916.722:245935): avc: denied { map } for pid=7875 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1655.186284] audit: type=1400 audit(1574201916.722:245936): avc: denied { map } for pid=7875 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.840135] kauditd_printk_skb: 1112 callbacks suppressed [ 1659.840144] audit: type=1400 audit(1574201921.675:247049): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.874059] audit: type=1400 audit(1574201921.675:247050): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.920730] audit: type=1400 audit(1574201921.685:247051): avc: denied { map } for pid=8001 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1659.962864] audit: type=1400 audit(1574201921.685:247052): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.010316] audit: type=1400 audit(1574201921.685:247053): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.059928] audit: type=1400 audit(1574201921.685:247054): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.110435] audit: type=1400 audit(1574201921.685:247055): avc: denied { map } for pid=8001 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.159855] audit: type=1400 audit(1574201921.715:247056): avc: denied { map } for pid=8003 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.201591] audit: type=1400 audit(1574201921.745:247057): avc: denied { map } for pid=8003 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1660.249827] audit: type=1400 audit(1574201921.745:247058): avc: denied { map } for pid=8003 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.851657] kauditd_printk_skb: 1121 callbacks suppressed [ 1664.851666] audit: type=1400 audit(1574201926.697:248171): avc: denied { map } for pid=8120 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.917495] audit: type=1400 audit(1574201926.697:248172): avc: denied { map } for pid=8121 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.959268] audit: type=1400 audit(1574201926.697:248173): avc: denied { map } for pid=8121 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1664.997886] audit: type=1400 audit(1574201926.697:248174): avc: denied { map } for pid=8121 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.025297] audit: type=1400 audit(1574201926.697:248175): avc: denied { map } for pid=8121 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.053223] audit: type=1400 audit(1574201926.727:248176): avc: denied { map } for pid=8121 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.076294] audit: type=1400 audit(1574201926.727:248177): avc: denied { map } for pid=8120 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.108231] audit: type=1400 audit(1574201926.737:248178): avc: denied { map } for pid=8121 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.151768] audit: type=1400 audit(1574201926.737:248179): avc: denied { map } for pid=8121 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1665.184091] audit: type=1400 audit(1574201926.747:248180): avc: denied { map } for pid=8121 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.856131] kauditd_printk_skb: 1113 callbacks suppressed [ 1669.856140] audit: type=1400 audit(1574201931.710:249294): avc: denied { map } for pid=8247 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.893510] audit: type=1400 audit(1574201931.740:249295): avc: denied { map } for pid=8248 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.925335] audit: type=1400 audit(1574201931.750:249296): avc: denied { map } for pid=8248 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.947679] audit: type=1400 audit(1574201931.750:249297): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1669.976533] audit: type=1400 audit(1574201931.750:249298): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1670.001024] audit: type=1400 audit(1574201931.760:249299): avc: denied { map } for pid=8248 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1670.027446] audit: type=1400 audit(1574201931.760:249300): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1670.052347] audit: type=1400 audit(1574201931.760:249301): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1670.080751] audit: type=1400 audit(1574201931.770:249302): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1670.106320] audit: type=1400 audit(1574201931.770:249303): avc: denied { map } for pid=8248 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:18:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:53 executing program 1: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000580)=0x0) timer_delete(r1) timer_getoverrun(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1) ppoll(&(0x7f0000001080)=[{r3}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r6, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) dup3(r4, r5, 0x0) fcntl$setown(r2, 0x8, r0) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RAUTH(r7, &(0x7f0000000100)={0x14}, 0x14) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r8, r7) fcntl$setstatus(r7, 0x4, 0x44800) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000000), 0x10000}]) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") tkill(r0, 0x15) 22:18:53 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3310a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r2, 0x0) 22:18:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) setuid(r1) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r4}, 0x14) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r5, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendmmsg$inet6(r3, &(0x7f0000003d80)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x800, @remote, 0x8000}, 0x0, &(0x7f0000001580)=[{&(0x7f00000000c0)="9d4f404c926d4863"}, {&(0x7f0000000100)="6eb32036e662c22aa8e9f6b0aa8323be58223d8a2200ebb5281ac8cb378541db40dce70ac1c04baae3dfe5cb6575639af8a9ec64b2536f367c1ce2cd6cfd51f4a4"}, {&(0x7f0000000180)="1a9567003a5925e513c71f203febbe77be29f56fde2c37f68b7c2630b3cb103bcb1a1a7ee04dfe480b469dc8923ba759e968baf17aeea1e1679640009b47866dc5de7d6ca4ab81edb7a8950ab24c3c1c7032fb46727b0c23b397672862aa65fe"}, {&(0x7f0000000300)="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"}, {&(0x7f0000000200)="28e8fcee7c69c181641b3e7bfe1c247c1670504ff92b5c10a56e1615c5b3f1ea5b979f9c22cde6d816cd5cbcaa86adee"}, {&(0x7f0000001300)='p'}, {&(0x7f0000001340)="36597772676ce7f041996465e074f6533ad20ef205903d9f3e4b91161411f2cf0d43b1f0a7ecb0d5f144df2ae980ca3b76dce7e1d17e4a4aba2dde29b339f7c16adc1bae703f89bb3dc1d8e9f27edf2c12845aae566e0db11e67216f54f10a98434890952a5a1e1d57c953db3055ed0d36c01b926ad7e3bbb2c2fade5e6c081790c8ba296e855635a376218e89c3134c9ba5611cf695401ce813e0ad97907d0926b4677c3da4a77cb0b8562e51aa5f8d9651b672ab55d3b9"}, {&(0x7f0000001400)="74221a0f8ec0a65c88f22fbe4e9a21351d0246ffc02b467384650c2b6744698acaf9f2e069c7ccc0efe4b0da5cc219a33b07c3601f08942d2d69d4f146b704d897af9a29f3f8971ca3718d335c51593e0835c97e6cb47b5280bdb377ae316e21ffcbe0194581f89eec3deceb874b935ca38e674ebd826a0526f7a16165699a7470b4462b3cb283bd3f05b7f7ed356f73b0"}, {&(0x7f00000014c0)="dbb496f9fb21de5129051564d69231479adb87b44d99ba09900bec7b27df0b"}]}}, {{&(0x7f0000001500)={0xa, 0x4e24, 0x3ff, @local, 0x1}, 0x0, &(0x7f0000001940)=[{&(0x7f0000001640)="0266b697e2956d5ca4db2b3808486bcfc066fc82398f9fd707d9b0275774bcec4e45917650b30c89a2fca017a57266341c3fb6b36a1f21fbd629a9008cce794693c9a336"}, {&(0x7f00000016c0)="e94897c4b516f370545a82f2eb1bb4260d8cc8db33f04240cc6b4e875d74c6d7c09f9b01e2f8296d9f0b2abd69d6d649892b5fd73d785961c99b7ca9c5038c9f4fa7b88cc8a6263a825ac82c1218e8fd557ae848a8d7196a107b34a29aa99c361aea5911689ebbe3ab9cb9c35f63f1801aebaa934cc0003a1092812d04537fe079e98b65e5a2b071e4608e6555352b08606809cf93c26a7b454a8984816de97abaded75a48db9d029039d2dabfed01edfb057ff06f4af529"}, {&(0x7f0000001780)="8aa6284c60aae4ec3eadbe5737117ef9282174fe43dd9b2d9669fae0315d4ea0920e07933df546158bce8e79e410de59ddd5bee14936e4c11af7e1f94d9689094ded7386b28bd3b9e45bc386acd7b39ce133fe6a07276f9fcc672b3881f9186ecf8d907cd01da2cde4c346d0f0d85de857ae12db4214644617b29a4e57bf496ab754ba8d49f5dffe1972e10acd84e3aa0a696b5f15917f650627eadb433cc95a8858588b6d6361a64f8c1161e363035b9e69666a8b1acbc5b6d38141f7ea6f"}, {&(0x7f0000001840)="f3901eeaefddf04b509997e9abbb75259b6f2251071de7b73fe1b9a6aedefa1ad187acc613e0b80001e469462564ce057a0cd6b8a6c95fa5db374191f788905d29f327e49d67e4590abf66de3f3efc3d2ae68c6562dbd9731d310711be9ed5dcb76dfa65bced569c7f5fb7c48e963b6d96bbe1d7b04fa597bb09a0c41b8f032cd213fb175063c730f6f08b43e5b956b26b4ceb547fc64a5e6820cbae3d6a34c3c86bc7ab029bd7d4af9608425f14f1081c3054d8f752f43c3802bc3e1def5fa8611e65e510055ebd25008273"}], 0x0, &(0x7f0000001980)=[@dontfrag={{0x0, 0x29, 0x3e, 0x80000001}}, @hoplimit_2292={{0x0, 0x29, 0x8, 0x20}}, @rthdr={{0x0, 0x29, 0x39, {0x0, 0x0, 0x2, 0x9, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @rand_addr="cda7aefcefe002142d66b0a33d1a494a", @dev={0xfe, 0x80, [], 0x29}, @dev={0xfe, 0x80, [], 0x15}, @mcast1]}}}, @hopopts={{0x0, 0x29, 0x36, {0x89, 0x0, [], [@generic={0x1, 0x0, "5c888f196bf5e47bc8ff78a2b126c111b732fd61bee3dd4bbbe7f34eaa0e128e31b3a55a44cff8606c424fbc0a5f76f1c7c17b248e16689f24f30a07c0cd626e8b801906faa4014d1317a9571075bfaf0a988134be99da96f64ef02ebf0e019641d3122620ea9d0270607effccf6d040bd7408b69f314aa8658ba8c20c4962d99905d2b5e1f456e2f123f89c5a259bed822182b51d139a97fac41e89ab554aa72afc3fb773970c7d4bed90a82667"}, @jumbo={0xc2, 0x4, 0x3ff}, @pad1, @calipso={0x7, 0x0, {0x3, 0x0, 0xff, 0x6, [0x9]}}, @generic={0x1f, 0x0, "bf2b8c370938cbef72528f71ce7f42fd"}, @jumbo={0xc2, 0x4, 0x1}]}}}, @flowinfo={{0x0, 0x29, 0xb, 0x1000}}]}}, {{&(0x7f0000001b80)={0xa, 0x4e20, 0x3002, @remote, 0xd113}, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001bc0)="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"}, {&(0x7f0000001cc0)="d62a9abf75e9b49b3fc8376a5e7ca73eb8ec1f4c8182fa2d61a40d5982bf2d7688a31f5bbd8042d62b179fb6e0c3"}, {&(0x7f0000001d00)="b5a12594cf354e441a7ea966fb79675b7bc0f1a49f37ad42946fdb343dcab6a5ed"}], 0x0, &(0x7f0000001d80)=[@flowinfo={{0x0, 0x29, 0xb, 0x9}}, @hoplimit={{0x0, 0x29, 0x34, 0x8000}}, @hoplimit={{0x0, 0x29, 0x34, 0x5}}]}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="32dd1c20f422a1855f971f4e6a95c502231f6d96552051265014dc884902e31ee190d04a3c7fd66ef29604c7b6ca2a3de2e183144e9c25307826788b555540855ae7818182131ae0b9ed2653fe25d365bba3972c17eb144245d5f9dab490934ed4e75aa77f3cd1b5"}, {&(0x7f0000001e80)="f733c02c10a216b03e0257366895433fb53b45409fff8e910f4318da8c46f8171b971b6523e4536509366788c8d1b2889c50545cdb24ec2d8f85727ee3cc03328abc1b6573316f7dc74f7718ac838bbac61dd4f69ccb503e6f73dd5149c889026414174998fe44fc065c94ebe802058c22270de7bcd876b749d27c32ee5f9cd2"}, {&(0x7f0000001f00)="c7aea9322764a8a2bceb96d7c4ca76e80fce74a25f6f4a6bdaf02fc0d4249e0eb9ef58b15a205fe7501c393529fe0d4af22c96fc9e6ef33355166ceb52a11bfd89c461081c5148acc1a1d30eae977ce49246c7f091f6cdc4ecb6939f7af170abf9eceed5825e530f1245bdb89bb1b88a572c10d5d42967d59c042bc3173bf07102999e051dded9ece254a2df043aabb1f302fb35308dca58396692306ad5e7c008e64d6ee9843f85ce57521af771f82c954c"}], 0x0, &(0x7f0000002000)=[@pktinfo={{0x0, 0x29, 0x32, {@mcast1, r4}}}, @tclass={{0x0, 0x29, 0x43, 0x6000000}}, @hoplimit_2292={{0x0, 0x29, 0x8, 0x7fffffff}}, @rthdr={{0x0, 0x29, 0x39, {0x33, 0x0, 0x0, 0x4, 0x0, [@remote, @remote, @dev={0xfe, 0x80, [], 0xf}, @dev={0xfe, 0x80, [], 0x21}]}}}, @rthdrdstopts={{0x0, 0x29, 0x37, {0x2b, 0x0, [], [@pad1, @ra={0x5, 0x2, 0x4}]}}}]}}, {{&(0x7f0000002100)={0xa, 0x4e20, 0x40, @local}, 0x0, &(0x7f0000003400)=[{&(0x7f0000002140)="170e481abb6e35353d7099cd3348ad2bf908e4ed18142d864c4971b87c7796d6e74ca6c3b260dcd311bab4de0be4c2507451b106c72faf934b25b20800177c8848766150d7ee207daf82a2369d93dce358b7a48a35da761621ef49792579a8550cd656ee01b314c60c0e0d"}, {&(0x7f00000021c0)="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"}, {&(0x7f00000031c0)="c694931b591f75d07153fa804eace112a949914b2244cab60a2bc9699b72b426efd6cbfb6b59f7632e80b317bf55a3c84950fa5b904e3e16badfffca42a0ebe05f368346ec5248ab90337ac7e70bc50a2a73ab012ddc447c13dbb72c54ccfb3ada6ce2bf2750510c57f6ab59cc79a334969f95644844f5dddc87241e728448b9e79843359e04af06ad2f963d019e2bfe09cd5a5ecb0150bbdab2b86c59ace2b25981ccc150d7470a23ab66f4750b610e8c2d86cba74da3e05f51ebce5e77ef5141e990c0b5c657c09bbfe0"}, {&(0x7f00000032c0)="29a7cac21e7eb463782d54b27ce9dd1dddca1862211b2eca5f31ab67be62dfe44decd3f1c82f6a7a5537fc6e8909ec2263b2c03e151d38d04d25527c96c35142eedb8d3a9ab35d89c6a006a5f74676d6befe81560f4353ed477f389984250d021ad12dd1bcb63503bf690a3b04fb1388a0ffde118b39cb890fa61da8b1de838cbd00"/144}, {&(0x7f0000003380)}, {&(0x7f00000033c0)="be202d03f04fc825f8dcd955129e3e7a2d7ce94e81d80daa0a8d6312"}], 0x0, &(0x7f0000003480)=[@pktinfo={{0x124, 0x29, 0x32, {@ipv4, r7}}}, @dstopts_2292={{0x0, 0x29, 0x4, {0x3a, 0x0, [], [@pad1, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x33}, @generic={0x1, 0x0, "9418d7f2a51f0f05c2d3747c9d50dce2f6efc6765ce9ef4840876c04a0b1d6516fcdc335cd7142c8be2197a118a1946db716947981634527732f5abc1837d8142c3571ad0979ed44c610e536995af6135e834f4aa8c5ec7f763e4674262d6daed3afff077dfd32800000000000"}]}}}, @dstopts_2292={{0x0, 0x29, 0x4, {0x5e, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}]}}, {{&(0x7f0000003580)={0xa, 0x4e20, 0x4, @rand_addr="2569f3a51552777310106d711cc2e5af", 0x80}, 0x0, &(0x7f0000003900)=[{&(0x7f00000035c0)}, {&(0x7f0000003600)="546de928b54ac3c5aeebf66549005c64988893869f2aa3d5744a696ed10c17e2d74b53fd2e039b91bf02ab39422946cdc2b26562f927b1feb2a8513ffe0a0dab0f567dc8abd5d8cc7efabb442d14a6ef623d9427506c62a2cf185c2f1b2cc0c03112ba5fa421ff766bb565f3c8b1c77ff15be45640c0fd92a688815c9bedf5cd17437be3888adc8f8be15dafa53e1e3a334368e0a5b103a984f6048956be17155159916175df31cbc0ba8e942d9ce1e58810d40fdbdc91103de294001cece70c4459c709f5498755bc6ee3d9cd3fea12dfda888fe38e01dea4f16bdf7a"}, {&(0x7f0000003700)="8882819b9c4347aa3df75b9c22cd16ee1892d08521139285ddebc9bd7874392e2f101e202c60b8f14ccd6f640ad6108d1ad1fc2f3d8323e828693f44fd7dfbee6ad8476b0608cf9a9fe43dfe67b084a41274fd94b2f7fd102fa875b205250f8c3c20ec411baf8f4bfef43b9615a9a9"}, {&(0x7f0000003780)="a02bdef408ee6bcdeab18011ccc18d708a6b81f40454896d6296b5d058ac7ec55661b6e642d09649b5e68da72056f55b14765c6535bcf88bbf78872580964407"}, {&(0x7f00000037c0)="55450b1ec7fcd81890a8e76191b8c0436215e6c4d018b24567740107d2f86283daf6b225201daf40599a44af08961dc00a6a6767ab76acd70f91061b4a1c9a7d71e7d7319f64d29f449cd402281b0ffbfe2fb2b42116e083023c213c4cb84f0ddf0b05cbd499743eb63bce04ad0b52e8663b06b438a8e2f450896663a1be289a1aa47f02310308be00ea6e106a1ca4f42a029a276edd66726b2ccf9e69e0c4683888a7708812ee75c23299ae3faddf473eb2ae0501c9179b7f"}, {&(0x7f0000003880)="1099b6ac142ba23522b63c04ce87fe10d9685676a1bab6da613333b2dd75654a20f6299524ca799ff3db33a2ccb330f8d2c28464527801d34283f70fd475e2085bbe0d9d0d64e7654acbbd8294d090edc2d0b4d09221c406d90b29ecbf7f0a24f6b9092ca605e4fe21ff33de0627a614c1319c84835161678a13e66007"}], 0x0, &(0x7f00000039c0)=[@dstopts_2292={{0x0, 0x29, 0x4, {0x2c, 0x0, [], [@enc_lim, @hao={0xc9, 0x0, @mcast1}, @calipso={0x7, 0x0, {0x4, 0x0, 0x3, 0x7, [0x7, 0x20, 0x8, 0x7, 0x9, 0x4f4e2efe, 0x7, 0x9, 0x3]}}, @hao={0xc9, 0x0, @ipv4={[], [], @empty}}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x4a7e}, @generic={0x3, 0x0, "ff32f609a68c924e585125dbb5521f057c07b0e3c59fcc2534bc8cb14b2b7fc4cff3dac38f99cebf428cd5aec4769b31c61665067770a587c113145ba1cf0c08a6d9998ae22019a631b1aecce03d918bfc3165bf6a5edcf242e42671c6a5f567757c6162a8aa48f5891d1f60b103f59cdabd2c5962dca1e0e0672c37c0d08dedaea9d9818d92f08b8c3ab9800d7aaf613afe31fb8f5160b7b40436b2a66b6a23e883c653e8ab1d71a18d815ecee8b50abb3c137a959baf628f381a6421b15391e8f96b651f3ab566679abaa6e060d02b4c22d6e56c84c26bf1d4139c1f607330320825f1d0ecde09a920ab644bcc74f77cf199e1de235ff50f"}]}}}, @hoplimit={{0x0, 0x29, 0x34, 0x3}}, @dontfrag={{0x0, 0x29, 0x3e, 0x7ff}}]}}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000003bc0)="7d16f365a8f4fe61a9bdc8a372d25a8e4617010a6f135c13b6ae9a384063ebf85ab6f837d1ad352ee178c842b0b392153b116634c3cce0bbe508a974ad45c2fe836c0cebb1fdd0db34b151fe80199cdd7d6a4a1d55f435b90d30f270cb670516c01f0653d4afb42e0f67aa735f9008b284ddc29dab49eee9cf8f8593dde4afee2a479a38e3635063905befc5243d6ab01ecb2d71d8f75fc8aa9a822d945a81b867aa782eee873afcc8262b2e14807603636729a7c3a8c8a1fbdfe0676ce42409ab51e48108627b1b2f6cf945df53261ac4cbd61ad957f328bbe38d83f649f7fcb9b1e192"}], 0x0, &(0x7f0000003d00)=[@hoplimit={{0x0, 0x29, 0x34, 0x800}}, @rthdr={{0x0, 0x29, 0x39, {0x3b, 0x0, 0x0, 0x7, 0x0, [@mcast1, @ipv4={[], [], @multicast2}, @mcast1]}}}]}}], 0x2, 0x1) 22:18:53 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x3, 0xb2f3}, 0x10008, 0x0, 0xfffffffc, 0x2, 0x0, 0x43}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x109) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x124) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d734c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca00000000000000", 0x600) r2 = socket$netlink(0x10, 0x3, 0x12) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0xffff, 0x4) sendfile(r0, r1, 0x0, 0x10000) socket$nl_route(0x10, 0x3, 0x0) 22:18:54 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2c21f8761f2832930"], 0x0, 0x9}, 0x20) tkill(r0, 0x31) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000180)=0x4, 0x4) 22:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3000000010003b0e00"/20, @ANYRES32=0x0, @ANYRES16=0x0], 0x3}}, 0x0) 22:18:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x3, 0xb7}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) request_key(0x0, 0x0, &(0x7f0000000c40)='%security\x00', r1) add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280), 0x0, r1) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000c00)='big_key\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400000013006b5300"/20, @ANYRES32=0x0, @ANYBLOB="0000000000f1ffa017fe5d007369740e00"/28], 0x34}}, 0x0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000280)={'\x16yz', 0x0}, 0x0, 0x0, r3) r4 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r4, 0x0) r5 = add_key$user(&(0x7f00000008c0)='user\x00', &(0x7f0000000940)={'syz', 0x1}, &(0x7f0000000a80)="0bab7fe3761baadc329096adb31acc53fbb39dce9c789a27ddf6d1b865e8b98473a31a52e46f0a09e318e5108c530a4f28765559cce5ca39c437836a63ca1f19c94801713db670c69a26a62bbb7baf3bbe24545d0df1b6227c89832a0be7c70858fc9dd382b32cf4cdfb2167e014654950ec65a622fa4efcb01566498352bc3706277f3ff8ae6c099e33fb14caa747e05b953162fa312c2bf5e87098dfd63e05d9d23300", 0xa4, 0x0) keyctl$negate(0xd, r5, 0xfffffffffffefffc, 0x0) pipe2(0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000980)='./bus\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x6) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x0, @dev, 0x10001}}}, 0x88) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/219, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 22:18:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:18:54 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fallocate(r0, 0x11, 0x0, 0x9000000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fallocate(r1, 0x11, 0x0, 0x9000000) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCGSID(r2, 0x5429, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) r4 = socket$inet6(0xa, 0x0, 0x100000001) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) 22:18:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="c2cf5f6fc23f266540bb76f777834810c062f204"], 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0xd4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 22:18:55 executing program 1: creat(0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003640)=[{{&(0x7f0000001300)=@rc={0x1f, {0xf5, 0x6, 0x40, 0x0, 0x8}, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f00000017c0)="bc031193043d783d13bbbb40081cbee5695b19fa", 0x14}, {&(0x7f0000001900)="ccfed6de5a1d9e6eca41b0afa1b06587892419ab36a453f2710617ba10a3f59f480e8c008fff08cfea1247442ff4e0c53c78e76b8844485ba6efd7fc0ad68af2d8fc5924617d70af119b2065cdbebcfad62ce0b9a9811703284a1f8d64191f6a639de6ef7f0f08292c9f1d42835da68ac8ef2ddd512277fff90a74e6ee84e42b1971806fcbcb5b0dfdb1b81c8e1b22dad9923980af9ddd", 0x97}, {&(0x7f00000019c0)}], 0x4, &(0x7f0000001b00)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001d80)=[{0x0}, {&(0x7f0000001d40)="d1d7f01fc7fd6277f89b7337b5a86c08db2bf74f8219f7fbd0", 0x19}], 0x2, &(0x7f0000001dc0)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18}}, @txtime={{0x18}}, @mark={{0x14}}], 0x78}}], 0x3, 0x20000) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000040)=0x1f) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x9, 0x9, 0xae, 0xf9, 0x0, 0x0, 0x8a080, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x8, 0x6e92, 0x2, 0x5, 0x8, 0x40, 0x9}, r3, 0x2, 0xffffffffffffffff, 0x0) [ 1673.400800] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 22:18:55 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x7f7d8c4d0263f46a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400000}, r2, 0xb, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb0}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r4, 0x0, 0x100000278, 0x20000000, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x7a) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x401c005, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 1674.113926] selinux_nlmsg_perm: 56 callbacks suppressed [ 1674.113938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8329 comm=syz-executor.2 22:18:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = open(0x0, 0x141042, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001880), 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x8dffffff, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KDDELIO(r0, 0x4b35, 0xffffffff) keyctl$read(0xb, r4, &(0x7f0000001640)=""/4096, 0x1000) add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="00e69600fca9e616"], 0x8) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/member\x00', 0x2, 0x0) fallocate(r3, 0x3, 0x0, 0x8020003) lseek(r3, 0x0, 0x3) 22:18:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x3ff}}, 0xe8) r1 = socket(0x2, 0x3, 0x82) r2 = dup(r1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000040)=r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 22:18:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x234, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f00000003c0)="b25d500f20bcb7ad34232ac0263c9edce3728cfe7258f46ad4970728fb783a5277240e0b174b69beb6064eee8236a76128c972e6d5f3", 0x4000, 0x0, 0x0, 0xf44c79ff277f413}]) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r8}]]}}}]}, 0x38}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r10}]]}}}]}, 0x38}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r11, &(0x7f00000005c0)={0x0, 0xfffffffffffffff6, &(0x7f0000000600)={&(0x7f0000000340)=ANY=[@ANYBLOB="32846c4eb9efe747eae8000000005200000429bd"], 0xffffffffffffffd7}, 0x1, 0x0, 0x0, 0x20040851}, 0x40) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r14, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r14, &(0x7f0000000080), 0x1c) getsockopt$bt_hci(r14, 0x0, 0x60, 0x0, &(0x7f0000d23000)) fcntl$setstatus(r14, 0x4, 0x80000000002c00) getsockopt$inet6_mreq(r14, 0x29, 0x1b, &(0x7f0000000440)={@remote, 0x0}, &(0x7f0000000640)=0x14) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14, 0x800) r17 = socket$inet(0x2, 0x2, 0x0) bind$inet(r17, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r17, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r17, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)='1', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r17, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r17, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r17, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) recvmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000b80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/11, 0xb}, {&(0x7f0000000c40)=""/125, 0x7d}, {&(0x7f0000000cc0)=""/140, 0xffffffffffffff3e}, {&(0x7f0000000d80)=""/148, 0x94}], 0x4, &(0x7f0000000e80)=""/54, 0x36}, 0x40) r21 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, 0x0, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, 0x0, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r27}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r27}]]}}}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f00000014c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001480)={&(0x7f0000000f00)={0x55c, r5, 0xabc756d2c5b4c2df, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x23c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6fe}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffc01}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @bpf_hash_func={{0xfffffffffffffd8b, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0x8, 0x1f, 0x9}]}}}]}}, {{0x8, 0x1, r16}, {0x88, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3, 0x6, 0xff, 0x81}, {0x2, 0x2c, 0x1, 0x101}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r19}, {0xd4, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x49f5, 0x4e, 0x4, 0x800}, {0x56, 0x7f, 0x4, 0x800}, {0x0, 0x41, 0x3, 0x8}, {0x4, 0x7f, 0x3f, 0x80000}]}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x7, 0x2, 0xfffffffb}, {0x2d17, 0xa1, 0x6, 0x7ff}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xc54}}}]}}, {{0x8}, {0xf8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xe6}}, {0x8, 0x6, r27}}}]}}]}, 0x55c}, 0x1, 0x0, 0x0, 0x40}, 0xc008010) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r29, 0x407, 0x0) r30 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="78f20156b04de0af2048cf75ac36a14b63f26c4b5318a15afb2d5d562f3fcd0ac38adc2e31d1b19565dc93c3c12898e6b837d43b4ac6b048a71547bdaad602816415380be85f08527cb7b577920311260291d46630bc322e4d0e435c1234ef238377b92927321f99f9c6946a40c14801a9a3508b9645d36e15c38608a418de0e47425d6f84b196ce7da1f1be7eb1cf128bb4194c618588275587e36363fa24c27056f59c54d9fd3b86d163636c54fd2fb0250f737085cfd0bd119d47e93f57ee9991c941eb68e0396f37ff49c151e08263bd08e9717956", @ANYRES16=r30, @ANYBLOB="000227bd7000fddbdf250108001369623a0000000000000200bf8900"/38], 0x24}}, 0x10) sendmsg$TIPC_CMD_SHOW_STATS(r28, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r30, 0x400, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xbd2e1f419b211662}, 0x2040040) write(r29, &(0x7f0000000340), 0x41395527) vmsplice(r28, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0xfffffffd, 0x3, 0x7}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 1674.868027] kauditd_printk_skb: 447 callbacks suppressed [ 1674.868036] audit: type=1400 audit(1574201936.712:249751): avc: denied { map } for pid=8366 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.151406] audit: type=1400 audit(1574201936.722:249752): avc: denied { map } for pid=8365 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.322597] audit: type=1400 audit(1574201936.722:249753): avc: denied { map } for pid=8365 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.491292] audit: type=1400 audit(1574201936.722:249754): avc: denied { map } for pid=8363 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.775772] audit: type=1400 audit(1574201936.722:249755): avc: denied { map } for pid=8363 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1675.885944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1675.949754] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1676.000563] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1676.017970] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1676.031684] audit: audit_backlog=65 > audit_backlog_limit=64 22:19:00 executing program 2: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = dup2(0xffffffffffffffff, r0) fcntl$setstatus(r1, 0x4, 0x800) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x80fe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20010, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xf12c}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x4200, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = socket$inet6(0xa, 0x1, 0x0) close(r4) r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) r6 = socket$inet6(0xa, 0x1, 0x0) close(r6) r7 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) sendfile(r6, r7, 0x0, 0x8000fffffffe) splice(r5, &(0x7f0000000000)=0x8, r6, &(0x7f00000000c0)=0x7f, 0x1d5, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r11, @ANYBLOB="1f000000000000001800120008000100767469000c00020008000100261e3502620140e4030cbda966eb264a1f717fdc73655bb139bd2903b51b6bc85a8291d1af7e38377c1c940141fdaeaa0becf7ffffff794e5462c3570e51ac036a9847feeca922ddabacd7caa47343e5f53c5c2f", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r11}]]}}}]}, 0x38}}, 0x0) 22:19:00 executing program 3: creat(&(0x7f0000000180)='./bus\x00', 0x112) r0 = getpid() r1 = getpid() symlink(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)='./bus\x00') rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) prlimit64(r0, 0x0, 0x0, &(0x7f0000000300)) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x80) ftruncate(r2, 0x0) gettid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r6 = geteuid() syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000380)='./bus\x00', 0x6, 0x2, &(0x7f0000000440)=[{&(0x7f00000004c0)="77531571b553d69591d61a6fd568a403558af40b44280fe42c534c45f1b1ffb2dc7986458277122d4641fc4e86233e852393e330a9ba45f7ebbf70ad41f46560d4e9f9eda220272962", 0x49, 0xffff}, {&(0x7f0000000540)="d61a9aeffe628bf21241cd7d722c3d4d5ff62e8ddb91c22a6df45e68cfa2dd5e591a0615cb921545c8508388076d9cc727685193f88eb0725d5195cc32f63dab39d755", 0x43, 0x23b3ba89}], 0x3000000, &(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYRESHEX, @ANYBLOB="8a0bd223e7a03445fb656183b3592db75701e5330b19cdab610944252897141fe6da4415ed7330e0950c6eedb84e65f96a3d97f177934b09e324677b8e13c10024041d2efad3bd3303f0d91fa8"], @ANYRESHEX=0xee01, @ANYBLOB=',check=relaxed,fowner>', @ANYRES32=r5, @ANYBLOB="2c61707072616973655f747970653d696d617369672c7365636c6162656c2c636f6e746578743d726f6f742c61707072616973655f747970653d696d617369672c736d61636b6673726f6f743d766574000000000000000000bd68002c657569643e", @ANYRESDEC=0xee01, @ANYBLOB, @ANYRESDEC=r6, @ANYBLOB=',measure,\x00']) lsetxattr$security_ima(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "e871e091695a8d03a1019fbd"}, 0xd, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x36001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x2, 0xf, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r7, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000040)=0x9a) sendto$inet(r7, 0x0, 0x0, 0x680c8fa3, &(0x7f00000008c0)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000100), 0x4) r9 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x2c3, &(0x7f0000000700)=""/26, 0x14}, 0x100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$binfmt_elf64(r7, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) r10 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r11, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r11, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r11, 0x1) fcntl$setpipe(r11, 0x407, 0xffffffff) 22:19:00 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2800) read(r2, &(0x7f0000000000)=""/121, 0x79) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 22:19:00 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)) open(0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x550dc4a64b72a34a) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x800}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000280)={0x0, &(0x7f0000000180)}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x0, 0x40000) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x400e64f, 0x7, 0x5, 0x4}, 0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="1a452236be6507ef832c505bafc8d2273e1915d2b8dc9622e266def01ad0a58246002338a69af7360ea34ada3eb7e55a2312a30b6f7098b4fc01a1dc02dc5624ed40e0c543fceebec542b8ce266eede9344c274f6ffac4597f84f27d29eec3c2485df113595c1811565844eff6e549f117bde79bc2c608f126990ac8fc9c4967d6d304d8faee59e28b187865ff3c0c475beab88be4c4cca9fde4c76875c28089921a683b28aba8a69e23d5447c980dfc836a07661a3a1609933cc3eebf3fc28634385121ae01ad92489af8a363a54a30ae8846ebd3189504847a0eab6919181a4cda76830141f2501033e124"], 0x0) unshare(0x60000000) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) ptrace$setopts(0x4200, r5, 0x7e6, 0x6) socket$inet_tcp(0x2, 0x1, 0x0) [ 1679.874451] kauditd_printk_skb: 537 callbacks suppressed [ 1679.874461] audit: type=1400 audit(1574201941.725:250088): avc: denied { map } for pid=8437 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1679.904310] audit: type=1400 audit(1574201941.755:250089): avc: denied { map } for pid=8437 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1679.930116] audit: type=1400 audit(1574201941.755:250090): avc: denied { map } for pid=8437 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1679.955161] audit: type=1400 audit(1574201941.765:250091): avc: denied { map } for pid=8437 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1679.979741] audit: type=1400 audit(1574201941.765:250092): avc: denied { map } for pid=8437 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.004321] audit: type=1400 audit(1574201941.805:250093): avc: denied { map } for pid=8438 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.030506] audit: type=1400 audit(1574201941.815:250094): avc: denied { map } for pid=8438 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.053012] audit: type=1400 audit(1574201941.815:250095): avc: denied { map } for pid=8438 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.078289] audit: type=1400 audit(1574201941.815:250096): avc: denied { map } for pid=8438 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1680.102634] audit: type=1400 audit(1574201941.825:250097): avc: denied { map } for pid=8438 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.896573] kauditd_printk_skb: 970 callbacks suppressed [ 1684.896583] audit: type=1400 audit(1574201946.747:251068): avc: denied { map } for pid=8546 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.925527] audit: type=1400 audit(1574201946.757:251069): avc: denied { map } for pid=8546 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.951746] audit: type=1400 audit(1574201946.757:251070): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1684.976594] audit: type=1400 audit(1574201946.757:251071): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.006351] audit: type=1400 audit(1574201946.767:251072): avc: denied { map } for pid=8546 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.029685] audit: type=1400 audit(1574201946.767:251073): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.058270] audit: type=1400 audit(1574201946.777:251074): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.084657] audit: type=1400 audit(1574201946.777:251075): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.113475] audit: type=1400 audit(1574201946.777:251076): avc: denied { map } for pid=8546 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1685.138331] audit: type=1400 audit(1574201946.817:251077): avc: denied { map } for pid=8547 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.897591] kauditd_printk_skb: 982 callbacks suppressed [ 1689.897600] audit: type=1400 audit(1574201951.760:252060): avc: denied { map } for pid=8649 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.926073] audit: type=1400 audit(1574201951.760:252061): avc: denied { map } for pid=8649 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.948711] audit: type=1400 audit(1574201951.760:252062): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.973767] audit: type=1400 audit(1574201951.760:252063): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1689.998602] audit: type=1400 audit(1574201951.770:252064): avc: denied { map } for pid=8649 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.022288] audit: type=1400 audit(1574201951.780:252065): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.048503] audit: type=1400 audit(1574201951.780:252066): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.074035] audit: type=1400 audit(1574201951.780:252067): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.099076] audit: type=1400 audit(1574201951.790:252068): avc: denied { map } for pid=8649 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1690.125032] audit: type=1400 audit(1574201951.830:252069): avc: denied { map } for pid=8650 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:14 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x10000) prctl$PR_SET_UNALIGN(0x6, 0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20080, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000100)) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000140)=""/91) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r3, 0x8925, &(0x7f00000001c0)={'ip6gretap0\x00', @ifru_hwaddr=@local}) prctl$PR_CAPBSET_READ(0x17, 0x9) ioctl(r2, 0x6, &(0x7f0000000200)="cca252eb0fc720bbe9e688e8b42445802abbaaaa41d3ba809f2f7a56e846066995b5f6840f751465ac474840d8129a15e265e5230a907c3515e240c342d7cb5412ad20fde8d288ad86311099098acb2ab610dbdf7167fbd702380e8ee9f01c25a75e5cda6cecbc32adf9e9469d974964b672b060858f") getrusage(0x0, &(0x7f0000000280)) r4 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="ef85ebe71d4801a1c8dc303dbf447e94fd0bb4e25217ef7c789ce605a1b098318b98aef5af93b469a0db7ab2aea2c36a4e257a42db768f41128460758e5899f9054ee6ceb0c0e424b37704070f6f6ba4b2896b5ea5f7c23ba264b4c3357f14cc57978681c23bcb2b7255b0", 0x6b, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000440)={r4, 0xd9, 0x57}, 0x0, &(0x7f0000000480)="9fb9b2e8551b530a8cb58f43306d618b4c18564f76f1c77e91af2ae39404aced0fdfb45593b73b8801aa958654404b48e9db1149da4c2e3e043b70fbbc9f1d0b2c5ce2ddbb710f46c9979a4b9b32cb197c5e1935edb2b3f95b6b9f43da52f79d46ed8de89e754257edba355a9c1e6b8171c7f18e016db75717ed8f5cef0fbd74c7e0217d4774441298b4fd4fd1cf1de58efe173b86fc0f4270a0039e36b086f266ac38e49c04ed1872ae949a67ebbff9d841edb8497da1d2e9958a1af2cf3805c7ee0b47392a2b150f53ba43174b3d1fcacf2cf12cb14f823d", &(0x7f0000000580)=""/87) socket$key(0xf, 0x3, 0x2) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/enforce\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000640)={0xfffffffffffffe01, 0x1000}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000680)=""/247) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f00000007c0)) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/enforce\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000840)=""/114) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_INPUT2(r8, &(0x7f0000000900)={0xc, 0x63, "f6823888548483158d29270801e55605ac068501d77689d944a1dd7e12ff6d6b676de156a99b9a814320c4885b7cb248f02f60a31e1572d243a27c6106b42078f6d766a3661affa057c5a1f604f1225aeaeab2fa7d8a26535bf7d51a25e1ca068ce6ea"}, 0x69) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, 0x1010, r9, 0xabbe9000) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TCGETX(r10, 0x5432, &(0x7f0000000a00)) 22:19:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) getpeername(r0, 0x0, &(0x7f00000000c0)) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) r1 = request_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='\x00', 0xffffffffffffffff) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000240)='keyring\x00', r1) 22:19:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0x8000000, r0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = open(0x0, 0x14180, 0x102) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x304}, "1a8f8d70697d12bb", "489ced0637f83a094ad53da760ade1a4448be1a4dd22020b3b27ee1194ef162a", "ce52c7df", "7d6362e50d7274e1"}, 0x38) r6 = getpid() write$tun(r4, &(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000780)=ANY=[@ANYBLOB="80f970fe487cdb2320c3866bc7d132adc9f8782e2b0b59340c6c36035e2ae94ff90e86d2d1b72fc1656937c38a849d63b9e05ef7c5f0f5b8b3bd06cbefd52d3aa354dbf1515dc297d1b83aa74f27a6ab3449c8bf1879484738650e84aeec1d4bf8dbb87e2a3f9a1013ff21243ca2de6049cc39944855f130ef8b5c4da971989f25aef48b1452c005ab6790db22", @ANYRESHEX], @ANYRESDEC, @ANYPTR=&(0x7f0000000200)=ANY=[], @ANYRESHEX=r3, @ANYRES32=0x0, @ANYRESOCT=r6], 0x6) write$P9_RWRITE(r4, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0x80000000}, 0xb) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{}, "309012cfb6ee0b00", "3778ac52daebc9eb66fa0b9b4fa3fe13b3686cfb18947bcfa85a849e9d7ccafd", "40f761e3", "4f784d9be3a08a80"}, 0x38) 22:19:14 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = epoll_create(0xdf) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) 22:19:14 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002780)=ANY=[], 0x0) clock_gettime(0x0, 0x0) epoll_create(0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000140)={{0x2, 0x4e20, @local}, {0x1, @dev={[], 0x16}}, 0x18, {0x2, 0x4e21, @broadcast}, 'dummy0\x00'}) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000040)=0x855) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) fallocate(0xffffffffffffffff, 0x43, 0x4, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 22:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180), 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:15 executing program 2: mknod(0x0, 0x0, 0x0) open(0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, &(0x7f00000001c0), &(0x7f0000000000)=0x550dc4a64b72a57f) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x400e64f, 0x7, 0x5, 0x4}, 0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) unshare(0x60000000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x9, &(0x7f0000000000)=0x8548224, 0x4) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x4) getpid() 22:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180), 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') recvfrom$inet6(r0, &(0x7f0000000200), 0x0, 0x100, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, r1, 0x506, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9032}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d86510", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:19:15 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x97) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x2000002) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x60) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r5, 0x0, 0x7fffffff) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) recvfrom$inet(r6, &(0x7f0000000180)=""/168, 0x47c, 0x40, &(0x7f0000000280)={0x2, 0x4e21, @multicast1}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x8800, 0x8800000) 22:19:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x80380, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000340)=0x5, 0x4) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400080a0}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xe8, r4, 0xa64d8a09ef123352, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6949e4314369d017, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff7023}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x59}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x26e}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20004804}, 0x4004010) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/bnep\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'yam0\x00', r3}) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TUNSETVNETLE(r7, 0x400454dc, &(0x7f0000000280)=0x1) 22:19:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x803, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridgS_slave_1\x00', 0x0}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="5500000018007f7000fe01b2a4a280930a60000000a84302910000000a00090023000c00140000000d000500fe800000e34f040a1a3ad5570800c78b80082314e9030b9d566885b17667", 0x4a}], 0x1}, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000100)={0x5, 0x8, 0x80, 0x800, 0x8000}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfdef}]) 22:19:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) writev(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) [ 1694.952744] kauditd_printk_skb: 406 callbacks suppressed [ 1694.952757] audit: type=1400 audit(1574201956.812:252476): avc: denied { map } for pid=8743 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:16 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x4439}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x40000, 0x0) creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xd) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r2) dup2(r1, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r6, 0xd, 0x1, 0x4, &(0x7f00000001c0)=[0x0], 0x1}, 0x20) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r7, 0x1) r8 = socket$inet(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r8, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r8, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r8, 0x1) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x80000001, 0x0, 0x0, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r4, @ANYRESDEC=r7], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRESDEC=r4, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB="e19cf40ac9c7bcaa32e009ab1efd5302d0ee75565d45048a45b8d83ea8cba0", @ANYPTR64, @ANYBLOB="5abe793916c74a647ac8be8699ceb1613fb33dd1eba81a20b85cb3a1f16571e3aa2371be44e70c4c2716f6a4bc5865179d2796d04d7df4a1b6ab385d6138c0c3783e7cd666921c99aa2e500ef3e0baba4be29eb7ca6fa9495a22ff85d88970410975f07fc1ef8206ded4205e58f61a461d303650f509f0f63a4490b5da9a05778dca38cae9c376475bec0490826d9e57633540b2063894a56c991cd24c45d53321ab7de7e357cb8bbb3374f4a80e59e1e7f275f66f86080a68311bb5fcfbc01e74bbb17598d7ed92e15cc3a776b2004c84b573c4b834", @ANYRESDEC, @ANYRES32=r7, @ANYRESHEX=r8, @ANYRESHEX=r9, @ANYRESHEX, @ANYBLOB="f0cf643e88eff71a7081751f598dd2f361968a558505171c3be2cc0867ccd4e2c1665fc485173fe5a886c2a3178cf2e48e792c82221e1b9df39e4749d43500ae3a847e2db09ea68e8dcc8422ddabf941a16528a2e966fcd4779cb2e1f999ff10e430b9623fb1ba885e7096c6fe3de4430433b67ccd1286b2b23f6af0ffe32a487cb2d971b6f9ed1d3864ed7910432fc37ab4d5a9932ad36fe1893d2fd2a3db3c33b55d2747a792a31631c0690efb0cfa8fff1c728259a61cde314c5f43174b720668939864497c2c953b13b89077c034a30ddc95143c3d39514e0279d6d333d6880e288ea631e13f"]]]) r10 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r10, 0xffeffffefffffffb) syz_emit_ethernet(0x4a, &(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5022234d96ed0040"], 0x0) request_key(&(0x7f0000000440)='.dead\x00', 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1695.141044] audit: type=1400 audit(1574201956.842:252477): avc: denied { map } for pid=8743 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1695.302268] audit: type=1400 audit(1574201956.862:252478): avc: denied { map } for pid=8743 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:17 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x1, @random="7b258cb6fd59"}, 0xc, {0x2, 0x4e20, @broadcast}, 'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@utf8no='utf8=0'}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r8 = socket$inet(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r8, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r8, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r8, 0x1) fadvise64(r8, 0x8, 0x6, 0x4) fstat(r7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r11]) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {0x1, 0x1}, [{0x2, 0x7cac777798ffd694, r4}, {0x2, 0x1, r6}], {0x4, 0x3}, [{0x8, 0x2, r9}, {0x8, 0x5, r11}, {0x8, 0xb, r12}, {0x8, 0x1, r13}], {0x10, 0x2}, {0x20, 0x1}}, 0x54, 0x1) [ 1695.442797] audit: type=1400 audit(1574201956.872:252479): avc: denied { map } for pid=8743 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1695.646992] audit: type=1400 audit(1574201956.932:252480): avc: denied { map } for pid=8743 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1695.830024] audit: type=1400 audit(1574201956.962:252481): avc: denied { map } for pid=8743 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1696.015016] audit: type=1400 audit(1574201956.992:252482): avc: denied { map } for pid=8743 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1696.094016] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1696.167993] FAT-fs (loop2): bogus number of reserved sectors [ 1696.250431] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1696.280062] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1696.306046] audit: type=1400 audit(1574201957.062:252483): avc: denied { map } for pid=8743 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1696.370491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1696.425388] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 22:19:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) syz_open_procfs(r4, &(0x7f00000002c0)='net/mcfilt\x96\xf8\xcber6\x00') bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r5, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f0000000280)='./file0\x00', 0x2) fstat(r6, &(0x7f0000000240)) r7 = dup(0xffffffffffffffff) setsockopt$packet_add_memb(r7, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x1, @local}, 0x178) fcntl$getown(0xffffffffffffffff, 0x9) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r2, r3, 0x0, 0x8000fffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="200000001000010800000000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="010100008000000048b7180314c8bc406a892b3feb81271b9eeac4e19421d81f68aed1330eb9beccddce00e9e3ee6f311bc4601c87ef0e6baf378218e154a2b4c9465291c7012100"/84], 0x20}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000300)=""/198, 0xc6, 0x0, &(0x7f0000000500)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x80) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4c014) 22:19:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@local, @in=@multicast2, 0x4e21, 0x1, 0x4e23, 0x0, 0xa, 0x80, 0x180, 0x84, r1, r2}, {0x4, 0x6, 0x10000, 0x6, 0x5, 0x100000001, 0x9, 0xfffffffffffffffc}, {0x2, 0x4, 0x5, 0x100000000}, 0x34573942, 0x6e6bba, 0x0, 0x3, 0x1}, {{@in=@multicast1, 0x4d5, 0xd0}, 0xa, @in6=@mcast2, 0x0, 0x0, 0xd39f86b57afed750, 0x20, 0x81, 0x1, 0x400}}, 0xe8) r3 = socket$packet(0x11, 0x3, 0x300) accept$packet(r3, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000200)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r7, 0x1) sendto$inet(r7, 0x0, 0x115, 0x200007fd, &(0x7f00000002c0)={0x2, 0x4e23, @empty}, 0x10) r8 = socket$inet(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000500)={0x2, 0x4e22, @broadcast}, 0x1ab) ioctl$int_in(r8, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r8, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r8, 0x1) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000004c0)={0x2, 0x4e26, @rand_addr=0x2d0}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) r10 = fcntl$dupfd(r8, 0x80c, r9) read$char_usb(r10, &(0x7f0000000340)=""/170, 0xaa) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x77, &(0x7f0000000600)=0x8, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 22:19:18 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)="ccdb521b5112fd689816f55cc422be09514dc72361f5fa9fa0c7760e72b9ea1a9daf1239290cd3dcbde1b35e127b545db49c0495e05ed61e8a94044ce8a27d86eab58f889b4c5d993df9", 0x4a}], 0x1, 0x1) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x81d184d36c29fb09, &(0x7f0000005480)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGNAME(r5, 0x80404506, &(0x7f0000000300)=""/139) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r6 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, 0x0) setreuid(0x0, r7) fsetxattr$system_posix_acl(r6, 0x0, 0x0, 0x0, 0x1) getresuid(&(0x7f0000004180), 0x0, 0x0) 22:19:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=0x2, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast2}, 0x1a) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) bind$unix(0xffffffffffffffff, &(0x7f0000000580)=@file={0x1, './bus\x00'}, 0x6e) lseek(r3, 0xedf, 0x0) write$smack_current(r3, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00', 0x10e) clock_getres(0x1, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x2000000000801, 0x0) getsockopt$inet6_int(r4, 0x29, 0x0, 0x0, &(0x7f00000000c0)) [ 1699.962886] kauditd_printk_skb: 374 callbacks suppressed [ 1699.962895] audit: type=1400 audit(1574201961.825:252830): avc: denied { map } for pid=8828 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.094226] audit: type=1400 audit(1574201961.825:252831): avc: denied { map } for pid=8823 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.169852] audit: type=1400 audit(1574201961.825:252832): avc: denied { map } for pid=8823 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.239861] audit: type=1400 audit(1574201961.825:252833): avc: denied { map } for pid=8827 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.359768] audit: type=1400 audit(1574201961.825:252834): avc: denied { map } for pid=8827 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.420142] audit: type=1400 audit(1574201961.825:252835): avc: denied { map } for pid=8827 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.479742] audit: type=1400 audit(1574201961.855:252836): avc: denied { map } for pid=8825 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.549786] audit: type=1400 audit(1574201961.855:252837): avc: denied { map } for pid=8825 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.609631] audit: type=1400 audit(1574201961.865:252838): avc: denied { map } for pid=8823 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1700.659625] audit: type=1400 audit(1574201961.865:252839): avc: denied { map } for pid=8823 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1704.987141] kauditd_printk_skb: 782 callbacks suppressed [ 1704.987152] audit: type=1400 audit(1574201966.847:253622): avc: denied { map } for pid=8914 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.015327] audit: type=1400 audit(1574201966.857:253623): avc: denied { map } for pid=8914 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.043061] audit: type=1400 audit(1574201966.857:253624): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.068430] audit: type=1400 audit(1574201966.857:253625): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.096302] audit: type=1400 audit(1574201966.867:253626): avc: denied { map } for pid=8914 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.119230] audit: type=1400 audit(1574201966.867:253627): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.148684] audit: type=1400 audit(1574201966.877:253628): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.173640] audit: type=1400 audit(1574201966.877:253629): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.201662] audit: type=1400 audit(1574201966.877:253630): avc: denied { map } for pid=8914 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1705.226364] audit: type=1400 audit(1574201966.927:253631): avc: denied { map } for pid=8915 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1709.985572] kauditd_printk_skb: 1010 callbacks suppressed [ 1709.985579] audit: type=1400 audit(1574201971.860:254642): avc: denied { map } for pid=9025 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.079452] audit: type=1400 audit(1574201971.860:254643): avc: denied { map } for pid=9025 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.165048] audit: type=1400 audit(1574201971.860:254644): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.200239] audit: type=1400 audit(1574201971.860:254645): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.254886] audit: type=1400 audit(1574201971.880:254646): avc: denied { map } for pid=9025 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.304424] audit: type=1400 audit(1574201971.880:254647): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.384814] audit: type=1400 audit(1574201971.890:254648): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.420208] audit: type=1400 audit(1574201971.900:254649): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.453114] audit: type=1400 audit(1574201971.900:254650): avc: denied { map } for pid=9025 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1710.473817] audit: audit_backlog=65 > audit_backlog_limit=64 22:19:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00?\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[]}, 0x78) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffffffffffffffc0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000080)={'syz1\x00', {0x0, 0x0, 0x0, 0xec}}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) socket$inet(0x2, 0x3, 0xa6) close(r2) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) r6 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/relabel\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000540)={0x34a8, 0x7, 0x5, 0x0, 0x0, [{r3, 0x0, 0xebc8}, {r4, 0x0, 0x100}, {r2, 0x0, 0x40}, {r5, 0x0, 0xfffffffffffffffd}, {r6, 0x0, 0x2}]}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) 22:19:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180), 0x0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:36 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') syz_open_procfs(0x0, 0x0) eventfd2(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000000c0)=""/182) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x200000a, 0x11, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) 22:19:36 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/142, &(0x7f0000000180)=0x8e) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x1, 0x0, 0x7}, 0x1ff}}, 0x18) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000140)) 22:19:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000001580)=""/4101, 0x1005}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0xda5, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x2327, 0x4001, 0x0, 0x27) sendto$inet(r0, &(0x7f0000000100)="1a76be0ffdd5a788cbe9c329630751c3a8f173bb3a2bb59098e9b0ba84d08c0fb5f0d3cf3be5ef85db99d6b29f734e35c70b122641b8537b79456103476e798e6345d94aeb5fb4fca1039ff58598cbc476f10eef6760a8cdf8ab31821695d34d6053b6a064866e871d3b8c4761a06cb4ea13e46c8ddcfbfa74f07718ebaefc4deafbc1dbebdeb41cf8f839cd9e2243d8f0afc84877cc800600fbd419314d2dd074b0b1e9fd8b63085d80df34050f60fe7faca8ed2e3b4c1da794a3ae53f1", 0xbe, 0x63cd3ba33738b295, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) 22:19:36 executing program 1: syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file1\x00'}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x56, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/create\x00', 0x2, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4205, r3, 0x202, &(0x7f00000000c0)={0x0, 0x1000000}) r4 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r4, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) r5 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) r6 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r6, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8ec43db8fdcd4f6a881951863d962c23f09da7a60231c732984c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a12728c86ba4099f172e02161ebfe1d07d497540f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a"]}, 0x0) r7 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r7, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="10040000"], 0x10}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r8, 0x29, 0x100000000000019, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r8, 0x0, 0xfffffffffffffef0, 0x0, &(0x7f0000000300)={0xa, 0x4e23}, 0x1c) sendto$inet6(r8, 0x0, 0x382, 0x0, &(0x7f0000000240)={0xa, 0x4e1d, 0x0, @remote}, 0x1c) recvmsg(r8, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x80000000002000) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000012c0)='irlan0\x00', 0x10) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x4000004) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) r9 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r9, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r10, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a90fc2435b43059f43c8ec43db8fdcd0f4a881951863c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c4cfdc780eba82e8928a12728c86ba4e448bfe1d07d497546184a7d721905cb60f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a1151643e42f48fda13c4ac982bb3a2b91ea8601f1b76b1530979d0ff3fe41e7c77d17b15fef5e6d198f91663f40608090b65"]}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001640)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000001680)={{{@in=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x80000000, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0x2f, 0x0, r11}, {0x9, 0x50b, 0x1, 0x7f, 0xfffffffffffffffd, 0x4, 0x3}, {0x3, 0x9, 0xffffffff, 0x3}, 0x9, 0x0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1}, 0x4d4, 0xff}, 0x2, @in6=@local, 0x0, 0x4, 0x1, 0x200, 0x9, 0xffff, 0x1ff}}, 0xe8) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) 22:19:36 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000006c0)=0xc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x21}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000080)={'syz1\x00', {}, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000000)=r5) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/198) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) fcntl$getownex(r6, 0x10, &(0x7f0000000d40)={0x0, 0x0}) syz_open_procfs(r7, &(0x7f0000000100)='stat\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r8, 0x0, 0x0, 0x0) socket$unix(0x1, 0xfaebfc655561807d, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0xfffffffffffffcc0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r10, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r10, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r10, 0x1) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r11, 0x5452, &(0x7f0000000000)=0x9) shutdown(r11, 0x1) sendmmsg(r10, &(0x7f0000002280)=[{{&(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, r11, {0x2, 0x4e23, @local}, 0x3, 0x3}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="6097a9611f3996643a01642e0f8fb9015eae69033faf9da7dd7d306149f5fba7d19e4b69a0186a41822ec05022fee7a0810c9d77366bb242f64a79517cadc0661e4db4f187bacc", 0x47}], 0x1, &(0x7f00000024c0)=ANY=[@ANYBLOB="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"], 0x1360}}, {{&(0x7f0000000840)=@ipx={0x4, 0x1f, 0x74, "73deaf325152", 0x5}, 0x80, &(0x7f0000002200)=[{&(0x7f00000008c0)="70cab1adc70ab8ac790f313d0cb98643d7c2110246610103660bb531e7a43a25844cc2b9f503d0bc02f089b37e2f1191f3a62c1fb757f0a75f0ab401856b3c4afa8d971284538b99c251ee01fbea6c27916693aed4cd4e073c91f105c41c333aead0e92c0f92712514bd24b26542f21769661fc9763f42757891cd0f3dc86275d9d7810dca43b71959c4bbb3a1b4a675e59bc2a48adb764086540f693868f9a608243272bb1291", 0xa7}, {&(0x7f0000000980)="33d9ac89fde24fff523c0bd7e225b1d25c9b7ccfc0c479e70dbc35ce608b578f910be4e18efad35441dd6bf02e3808c17e790ce2927054e0", 0x38}, {&(0x7f00000009c0)="602055ea1dee3377d79e4fc24539add28294e4590cab6bb88c20d519adcd62ee05690a302cf896e34d760df0fb2008070b0cbe841ac621b33b00be7b96bbc6976a61768c06a7d7f10523559ccbf7c4a6ac381fc17ced8782804e27c9d95ef76e1f9ab4ac216570f8a9d496732b00889ced09b3a509539f09f94374a169adf63f7f176a3a18fc50b4", 0x88}, {&(0x7f0000000a80)="d6a35e9f4a3d17592fd6e50a49f4c980f6bc3c9ab99789431c9f049b7f61cb4712d8e92e63027b19d2dbfbd0a61989aaf48cc182649142c7f1aa48cd1467fe32087b5a63fcc2be490c0b8b0aa86ea9fe2ac6ead3f258a442655a53ecefba4185d57a9fa53c1b883935c48aa122c8a41b12afdc160270d2333618075fb506eac96ec1cb47e7ec37765d429306c14de70eaf64ebab5ba23cee9514be4a21b4a63a31544ceec964f9830c20ca8ca9fa609244a8005b7e9d81110d96432efe3fe63b37e78217b20f23b62154884623e50b90b0abc6", 0xd3}, {&(0x7f0000000b80)="382eb91c93502e791dee9aa7899149c1d48c141a1382ca7851446125d9c892559a82c3d7466059903d1a37b26cf45741837e75f04ae4f4efb47b20995c53a21af9194ab88a63395a85bd2723dcf3f2a93ee84dd1a18907bcacc5d4a9ea6d82ef9c3d6ac1dcf6ba12411b10873a954fb3997f59e3b00cea47a1e902f2", 0x7c}, {&(0x7f0000000c00)="6ee8d20730bdf14d9b8513644a90611234ce1cd4326a90b5522f1b5d578869e9f334e2fef0772b56c83e89b7d45467f279b1588746813fc8aeadf3eda134875a7915d5af901c3f90be2f360d01a0f7823ec7eec0f1b03b1ae1781f223f1082bd29f051129e2baf6d37f533e686856b4cadd68ad28b0f4f1190af3a1ce5400b78d2650dd40f87ff1ec235ced6ea5899471860913a65874cdd4e4e379b680a7796b2cb05b90db1f6d040854140822ee0d49e131f9c89f9f99c594eb8b1f378035eb9b70f851dc73ce918455046175d0300db39bb9537400de487824e96851b4a138c5deb0ab3419a33db5220f1d531865b8ba24146be60", 0xf6}, {&(0x7f0000002300)="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", 0x1a8}, {&(0x7f00000021c0)="b345ca9ec4dbf50e66188c1fba762d19bf94f1b1d6bb98e593c4e13a28544f5d", 0x20}], 0x8}}], 0x2, 0x40080) 22:19:36 executing program 4: r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"/295], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000280)) tkill(r0, 0x80000039) ptrace$setregs(0xd, r0, 0x1f, &(0x7f0000000180)="e5c2a3beff81b809ec0f82eef758819ccf6ae92a48a40054c2cb06d64b939d5fb218eb7564468a0dae56562c4ad5b0546ef8bb29aabe698bf5d6e30b70ec5a0743ef06522e4c1ad689f4a149309cc9664543c7031d7357d89c227f951f3138") wait4(0x0, 0x0, 0x0, 0x0) 22:19:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f", 0x74, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0xec00, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000100)={0x9, {{0x2, 0x4e23, @multicast1}}}, 0x88) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001d000100000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="4203f3c9bd0275c63fd10493a3a255fece08cd5177d2e05cb5e9b014b4f1b6f6c87cd2ea96872e39d74cdd8f1e69ab55ff2c89814ec20e132f6a8dccb1eaadd2fe0b7cdbbc879a6bcb242d78fab2d5873e70c9ae76fb2225b4fb6e56b912409d38cbad266ff0d85ca9eb036671b3fe8c988082365294e320b73f16192875a0f6c4d801baa96fd7acb12be7d0f0c9e871ccbea8"], 0x1c}}, 0x0) 22:19:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f", 0x74, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:19:37 executing program 2: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000580)=ANY=[@ANYBLOB='security\x00'/22], 0x1) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RWSTAT(r4, &(0x7f0000000180)={0x7, 0x7f, 0x2}, 0x7) r5 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe0, 0x0) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000100)=@generic={0x0, 0xffff, 0x5}) lsetxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1) ioctl$RNDADDENTROPY(r2, 0x40085203, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000300)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) fstat(0xffffffffffffffff, &(0x7f0000000840)) r8 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) 22:19:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174000203010075030270f7f8d501bc46ef7e49d41e85ba53e2d27057ec2bcc40c7f91d4725ae4e9e24136e", 0x2ee}], 0x8004, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1263400}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe0, 0x6, 0xa, 0x300, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x2}, [@typed={0x8, 0x48, @u32=0x80000000}, @generic="3c9f7261346b0b8da8b07c74455c1f74a453a8ee3e2ac16fa2a46ddb51c436e906ce451f78ce645e9e52e9ea430f6b36804e166a4b57ce65fcfbcc806ec599fc1e2cc2237d4af09c63790bdc6bf6e378bad527a62e1ee3799e5dde92c7a5de5484b6ffebac5f716279a74076ab64c1127b1af3e1d7bfad0f3f1d82a5c8f2749aaf31c994ba2f6296d7efefb9d4dea43d6bb6387d3ad9b9c5cc039248cd32d4daaf3ba3566d45f81e01ef90e6139aface", @typed={0x14, 0x3a, @ipv6=@rand_addr="ca6735a1d713e6b65275e37a852c4832"}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4080}, 0x80c0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000000) 22:19:37 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote, 0x0}, &(0x7f00000001c0)=0xc) recvfrom$packet(r0, &(0x7f0000000140)=""/91, 0x5b, 0x10001, &(0x7f0000000200)={0x11, 0x7, r2, 0x1, 0x80, 0x6, @dev={[], 0xa}}, 0x14) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) setrlimit(0xb, &(0x7f0000000040)) r3 = gettid() tkill(r3, 0x26) [ 1715.400498] kauditd_printk_skb: 634 callbacks suppressed [ 1715.400508] audit: type=1400 audit(1574201977.263:255283): avc: denied { prog_load } for pid=9126 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:19:37 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) pipe(0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000000)=""/55) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000180)) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x9) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_nanosleep(0x3, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8040fffffffd) [ 1715.576801] audit: type=1400 audit(1574201977.393:255284): avc: denied { map } for pid=9130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1715.695371] audit: type=1400 audit(1574201977.403:255285): avc: denied { map } for pid=9130 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1715.780664] PF_BRIDGE: RTM_DELNEIGH with invalid ifindex [ 1715.853633] audit: type=1400 audit(1574201977.403:255286): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:37 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='mode=00000', @ANYRESDEC, @ANYBLOB="71f28bac3b0ce83d47980abf96dd6335946fc784069cc4f5ad501e05b460"]) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="4cdb3852183f518c43ea399cacbcd665", 0x800, 0x0, 0xff, 0x1}, 0x100000176) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0)="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", 0xfc) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000680)=0x7) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) [ 1716.055730] audit: type=1400 audit(1574201977.403:255287): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.205956] audit: type=1400 audit(1574201977.483:255288): avc: denied { map } for pid=9130 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.368162] audit: type=1400 audit(1574201977.483:255289): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x1, 0x0, 0xfc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffbffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x20010, r0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) prlimit64(r1, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$setregs(0x2, r1, 0x7e4, &(0x7f00000000c0)="c5a1ad38996c01120231dfa8169bf8d20c0e271b2b172461d20f94dc09bc38e23db351ae212ed873d23c74c3e15e2f8e36fa24f0839e6867698663538936ba2b34483ea3a12f2c2e145ebbf2233b1e19a61c068f06878cc86fd8a075a48cb2d182fe61af3c64") fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='limits\x00') getdents(r6, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x400806e, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) 22:19:38 executing program 3: creat(0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) sendmmsg$sock(r0, &(0x7f0000003640)=[{{&(0x7f0000001300)=@rc={0x1f, {0x0, 0x6, 0x40, 0x81, 0x8}, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000001580)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {&(0x7f00000017c0)}, {&(0x7f0000001900)="ccfed6de5a1d9e6eca41b0afa1b06587892419ab36a453f2710617ba10a3f59f480e8c008fff08cfea1247442ff4e0c53c78e76b8844485ba6efd7fc0ad68af2d8fc5924617d70af119b2065cdbebcfad62ce0b9a9811703284a1f8d64191f6a639de6ef7f0f08292c9f1d42835da68ac8ef2ddd512277fff90a74e6ee84e42b1971806fcbcb5b0dfdb1b81c8e1b22dad9923980af9ddd", 0x97}, {&(0x7f00000019c0)}], 0x4, &(0x7f0000001b00)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}, {{&(0x7f0000001bc0)=@sco={0x1f, {0x81, 0x5, 0x7f, 0x0, 0x5}}, 0x80, &(0x7f0000001d80)=[{0x0}, {&(0x7f0000001d40)="d1d7f01fc7fd6277f89b7337b5a86c08db2bf74f8219f7fbd0143926", 0x1c}], 0x2, &(0x7f0000001dc0)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x78}}], 0x3, 0x20000) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) sendfile(r1, r2, &(0x7f00000000c0)=0xffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) creat(0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents(0xffffffffffffffff, 0x0, 0x0) [ 1716.538990] audit: type=1400 audit(1574201977.483:255290): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1716.681002] audit: type=1400 audit(1574201977.553:255291): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:19:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x16b) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) sendfile(r2, r2, 0x0, 0x8080fffffffe) bind$unix(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, 0x0, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000400)=""/211, 0x26) r5 = socket$unix(0x1, 0x5, 0x0) fcntl$setflags(r5, 0x2, 0x1) bind$unix(r5, &(0x7f0000003000)=@file={0x1, './bus\x00'}, 0xfffffffffffffe23) listen(r5, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r6, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$P9_RGETATTR(r2, &(0x7f0000000280)={0xa0, 0x19, 0x2, {0xd06496346609718, {0x10, 0x4, 0x8}, 0x11, r3, r4, 0x100, 0x7, 0x6, 0x9, 0xdd52, 0x101, 0x81, 0x46bc, 0x9, 0x1, 0xffffffffffff7fff, 0x1, 0x8, 0x4, 0x7f}}, 0xa0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stat\x00') ioctl$TIOCGISO7816(r5, 0x80285442, &(0x7f0000000080)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) [ 1716.904642] audit: type=1400 audit(1574201977.563:255292): avc: denied { map } for pid=9130 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1717.386535] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 22:19:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4620, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x440402, 0x0) ftruncate(r2, 0x10099b7) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r1, r2, 0x0, 0xfffffffd) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000000c0)=0x1) 22:19:40 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xffeffffefffffffb) syz_emit_ethernet(0x4e, &(0x7f0000000480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c600", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}]}}}}}}}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000280)=ANY=[@ANYBLOB="7f08040403400900ff010000400001000073c68c69002300b6674c28838e4a81000000000000010000f35910074a0000000dfe80000006000000000000e89ce6a200f90000bb400000000000006bcad0964e69f9efa5c7cea88b0443433fffff91f72ad8a58202df5af7b06e09b7d94c0d0a432f7c6f0a65519254231b5ed89132d54196c71f42879e22fa908af7ccb8869fdc7859226d9f81d6d209538fc7fac20dd72afabf79b342189fe6c8cc17a61bb664e501cb6a98038fde00000000eae0247d92dfde8b0da6bb67c20340d76e98d336d8f16552b2846f124e2b7ab5e5f1067f85020060ba03f9e99e507397cfaea9fafabf016288de11ec3589e1a0f55778aa90b6360bc0a991a247841c84a86fda851f1349e170f56459fa25c4cef17ee95ec903d8b9ffdc21a18b2896f0fb278349cd1ed02c58f8436b56901eef6b7ac3dd716ecf477803499b1ecf8fa96894ecc33af01cc2f5f0b090880fb9f28459615fe061accf897d7ed121556834dadabf388b63f2954892d7555db382f3f025388c431f44c09735e4d4af5667c9a17517ec4b7dbde71747d26755cd29c18bc845cf424177d914ae774793359a46a505e5dc0d9e93a2a8bd5206da74079b83a52c743898bb834b20faf3c79bbabff95179a1183a2f2b4d050fc8bdab812c11586c7279f1647c8afd9b15446eefda49c164efde9f5f3dbd1f1bd1f07e18f10d2ecc071f52519efe1e612ebc65fb2797a1158e21f6eb256a2cc519f2c52703f201c53db896090fde196321ee68f47a"], 0x48) getsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, &(0x7f0000000040)) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) [ 1718.966279] syz-executor.1 (9180) used greatest stack depth: 22128 bytes left [ 1720.412501] kauditd_printk_skb: 155 callbacks suppressed [ 1720.412512] audit: type=1400 audit(1574201982.285:255448): avc: denied { map } for pid=9195 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1720.554689] audit: type=1400 audit(1574201982.285:255449): avc: denied { map } for pid=9196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1720.679637] audit: type=1400 audit(1574201982.285:255450): avc: denied { map } for pid=9196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1720.809530] audit: type=1400 audit(1574201982.285:255451): avc: denied { map } for pid=9196 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1720.919493] audit: type=1400 audit(1574201982.285:255452): avc: denied { map } for pid=9197 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.019519] audit: type=1400 audit(1574201982.285:255453): avc: denied { map } for pid=9197 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.099471] audit: type=1400 audit(1574201982.285:255454): avc: denied { map } for pid=9197 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1721.144015] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1721.156816] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1721.179420] audit: audit_lost=1247 audit_rate_limit=0 audit_backlog_limit=64 [ 1725.425306] kauditd_printk_skb: 896 callbacks suppressed [ 1725.425316] audit: type=1400 audit(1574201987.298:256333): avc: denied { map } for pid=9290 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.500364] audit: type=1400 audit(1574201987.308:256334): avc: denied { map } for pid=9291 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.531661] audit: type=1400 audit(1574201987.318:256335): avc: denied { map } for pid=9291 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.557224] audit: type=1400 audit(1574201987.318:256336): avc: denied { map } for pid=9291 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.586815] audit: type=1400 audit(1574201987.318:256337): avc: denied { map } for pid=9291 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.615639] audit: type=1400 audit(1574201987.328:256338): avc: denied { map } for pid=9291 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.642338] audit: type=1400 audit(1574201987.328:256339): avc: denied { map } for pid=9291 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.668939] audit: type=1400 audit(1574201987.328:256340): avc: denied { map } for pid=9291 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.710456] audit: type=1400 audit(1574201987.328:256341): avc: denied { map } for pid=9290 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1725.741376] audit: type=1400 audit(1574201987.338:256342): avc: denied { map } for pid=9291 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.429195] kauditd_printk_skb: 1099 callbacks suppressed [ 1730.429204] audit: type=1400 audit(1574201992.310:257442): avc: denied { map } for pid=9411 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.474438] audit: type=1400 audit(1574201992.310:257443): avc: denied { map } for pid=9411 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.524675] audit: type=1400 audit(1574201992.320:257444): avc: denied { map } for pid=9411 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.584888] audit: type=1400 audit(1574201992.320:257445): avc: denied { map } for pid=9411 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.627655] audit: type=1400 audit(1574201992.320:257446): avc: denied { map } for pid=9411 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.684647] audit: type=1400 audit(1574201992.350:257447): avc: denied { map } for pid=9415 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.734656] audit: type=1400 audit(1574201992.380:257448): avc: denied { map } for pid=9415 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.774665] audit: type=1400 audit(1574201992.380:257449): avc: denied { map } for pid=9415 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.824830] audit: type=1400 audit(1574201992.390:257450): avc: denied { map } for pid=9415 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1730.853062] audit: type=1400 audit(1574201992.390:257451): avc: denied { map } for pid=9416 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.433263] kauditd_printk_skb: 1116 callbacks suppressed [ 1735.433273] audit: type=1400 audit(1574201997.313:258568): avc: denied { map } for pid=9535 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.492342] audit: type=1400 audit(1574201997.313:258569): avc: denied { map } for pid=9535 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.542512] audit: type=1400 audit(1574201997.313:258570): avc: denied { map } for pid=9535 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.586567] audit: type=1400 audit(1574201997.323:258571): avc: denied { map } for pid=9535 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.632703] audit: type=1400 audit(1574201997.323:258572): avc: denied { map } for pid=9535 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.682150] audit: type=1400 audit(1574201997.343:258573): avc: denied { map } for pid=9536 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.727945] audit: type=1400 audit(1574201997.343:258574): avc: denied { map } for pid=9536 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.782703] audit: type=1400 audit(1574201997.343:258575): avc: denied { map } for pid=9536 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.832063] audit: type=1400 audit(1574201997.353:258576): avc: denied { map } for pid=9536 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1735.856273] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1740.463315] kauditd_printk_skb: 1125 callbacks suppressed [ 1740.463321] audit: type=1400 audit(1574202002.345:259691): avc: denied { map } for pid=9663 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.496017] audit: type=1400 audit(1574202002.375:259692): avc: denied { map } for pid=9663 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.518986] audit: type=1400 audit(1574202002.385:259693): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.546824] audit: type=1400 audit(1574202002.385:259694): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.571164] audit: type=1400 audit(1574202002.395:259695): avc: denied { map } for pid=9663 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.597605] audit: type=1400 audit(1574202002.395:259696): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.624389] audit: type=1400 audit(1574202002.395:259697): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.653169] audit: type=1400 audit(1574202002.405:259698): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.677978] audit: type=1400 audit(1574202002.405:259699): avc: denied { map } for pid=9663 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1740.706306] audit: type=1400 audit(1574202002.445:259700): avc: denied { map } for pid=9664 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f", 0x74, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:04 executing program 5: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/420], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) fgetxattr(r1, &(0x7f0000000040)=@random={'osx.', 'eth0\x00'}, &(0x7f0000000140)=""/51, 0x33) 22:20:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) memfd_create(&(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r3, &(0x7f0000000340)={'syz0\x00', {0x1, 0x20, 0x6, 0x3}, 0x51, [0x6, 0x101, 0x1, 0x0, 0x1, 0x1ff, 0x7, 0xfffffffa, 0xff, 0x1, 0xfffffff9, 0x5, 0x8, 0x200, 0x7, 0x0, 0x9, 0x7, 0x10001, 0x3, 0x7f, 0x200, 0x5, 0x0, 0xff, 0x4, 0x20, 0xf1, 0x3, 0xc6a4, 0x10000, 0x8, 0x2f, 0x6, 0x5, 0xd0, 0x8, 0x2, 0x20, 0x20, 0x1ff, 0x8, 0xc2, 0xa2a, 0x1, 0x7, 0x9b7, 0x8, 0x69, 0x3e5f, 0x3, 0xfffff559, 0x8001, 0x80, 0x6, 0x0, 0x1f, 0x20, 0x3a, 0x5, 0x4, 0x80, 0x8001, 0xfff], [0x8, 0x0, 0x401, 0x2, 0x3, 0x5, 0x7fff, 0x0, 0x4c955f3a, 0x1, 0x9c1, 0x3, 0x90, 0x400, 0x7, 0x8, 0x1, 0xee, 0x1, 0x9, 0x101, 0x5, 0xffffff7f, 0x6, 0x3, 0x1000, 0xffff9006, 0xb7, 0x3, 0x9, 0x7f, 0x6, 0x2, 0x10000, 0x5, 0x8, 0x5, 0x4, 0x3f, 0x40, 0xfff, 0x8, 0xed5, 0x8, 0x200, 0x3f, 0x9, 0x8, 0x9, 0xbf, 0x5, 0x785ba63e, 0x37, 0x100, 0x1, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x2, 0x4, 0x7, 0x8], [0x80000001, 0xd9, 0x5, 0x70, 0x3ff, 0x1, 0x0, 0xd7a5, 0x3, 0x9, 0x5, 0x4, 0x80000001, 0x10001, 0x8, 0x6, 0xd1b3, 0xfffff0b9, 0x9, 0xfffffeff, 0x63b, 0x3, 0x6, 0x6, 0xbb, 0x3, 0x80000000, 0x100, 0xf4b0, 0x401, 0x5, 0xfffffffc, 0x4, 0x1, 0x100, 0x7, 0x0, 0x2, 0x6e93723d, 0x3, 0x2, 0x9, 0x80000001, 0x8000, 0xf16c, 0xff, 0xff, 0x1, 0x0, 0x4, 0x0, 0xfff, 0xffff, 0x6, 0x0, 0x1, 0x40, 0xc000000, 0x8, 0x0, 0x3ff, 0x1f, 0x7ff, 0x10000], [0x6, 0x10001, 0x0, 0x5, 0x3, 0x31893c2, 0x8, 0x347a98f1, 0x8, 0x8, 0x7, 0x8, 0x79, 0x793, 0x7, 0x9, 0x7, 0x7, 0x1, 0x6, 0x4, 0x7fffffff, 0x9, 0x7fff, 0x8000, 0xfffffff7, 0x9ed, 0x20, 0x9, 0x40, 0x80000000, 0x9, 0x3ff, 0x40, 0x0, 0x6, 0xf771, 0x7, 0x101, 0x401, 0x6, 0x0, 0x3, 0x8, 0xfffffffd, 0x4, 0x7ff, 0x1, 0x80, 0x6, 0x0, 0x10001, 0xc0, 0x4, 0x9, 0x4, 0x5, 0x3, 0x7fffffff, 0x4, 0x1, 0x6, 0x8, 0x10001]}, 0x45c) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0xffffd000) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') rt_sigaction(0x1b, &(0x7f00000000c0)={&(0x7f0000000040)="450f92b7000000000f3802cfc482e59fbd00000000448392d700000000f30faee93e421d00000000800d16afcf4b006766410fd6fec4024db66812f2400f2df9", {0x2}, 0x40000003, &(0x7f0000000080)="46ca0000c4620998f8c441d5d1110003d916e34f8f0978d7a15d880000640fdf9eb6ab825bc4a2cdb9f92ef2abc403c57b6f8c88432404"}, &(0x7f0000000240)={&(0x7f0000000100)="3666400f71d20036410fc2fb00660feec6c42239989ecd000000f3420f589b0000000067410277c6f3410f5cfa66440fd35b0ac462f93052cb40d14d00", {}, 0x0, &(0x7f0000000200)="c463d142b96a4268c10047be00000000c4a1fd10e12e0f7e37c4a3357974b100748f48389f84280700000008c4630d6929568fc97099c40db50000000f90d2"}, 0x8, &(0x7f0000000280)) 22:20:04 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x808108}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xd4, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x2b7f2fa993658543}, 0x4000010) rt_sigprocmask(0x0, &(0x7f0000057ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000140)) io_setup(0x3, &(0x7f0000000080)=0x0) r4 = memfd_create(&(0x7f0000000040)='kD\xfbx\x0e;Nz\xb5', 0x0) io_submit(r3, 0x26b, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000280)="04", 0x1}]) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000380)) 22:20:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f00000000c0)=""/55, 0xfe}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='*em1`(em0\x00') r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x80) 22:20:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = dup3(r0, r1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, 0x0) 22:20:05 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') 22:20:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:20:05 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbae1}) 22:20:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e", 0xae, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:06 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/112, 0x70) readlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/193, 0xc1) 22:20:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16}]}, 0x30}}, 0x0) 22:20:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e", 0xae, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_buf(r0, 0x0, 0x50, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x67}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020200090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000c1374611"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x17e65, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) listen(r3, 0xffffff80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000480)=0xfffbffff, 0x45) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x92aafdf1d07c4157) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f00007630260300e29507449a40cd620bc9aa172172284bb400"/37], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f00000005c0)="c97c2df7d5e64e7c769d6ccaea19537826c92ea9186a4f58ff35f399bd9eba0c3b53ff4b6744f862d99d6037bb484a902f9a76bbf93e1591a9ff7b35503f19b2620ece27eea79694e08389f067b3e550545d479ab6467e84b3f98c2a0fafb5a9d0ba1f553267a93a9669ddbd41f3cd8beb9359efb3ee57ddb7c1e0b56beb242ce93393bbd8fb37f1a5792c55973b72c56ba34417c89530982d56c523a3f688754af235235c012105c3462df8eb7cb69e9ef10530dd7037d410f60324d25342dc763533383e005568d47d4a83ce934f32d0cefa63df5ec4dea3ebb188b5710bb23279d14158526129245093c3cefa851a410d9850") [ 1744.415633] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1744.513372] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:20:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f00000000c0)) write$P9_RXATTRCREATE(r3, &(0x7f0000000140)={0x7}, 0x23d) ftruncate(r3, 0x208200) fcntl$setstatus(r2, 0x4, 0x3fffe) io_setup(0x2, &(0x7f00000004c0)) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5421, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10) shutdown(r7, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) eventfd(0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r10 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$inet(0x2, 0x1, 0x0) bind$inet(r13, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$int_in(r13, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r13, 0x0, 0x119, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x64) shutdown(r13, 0x1) r14 = open(&(0x7f0000000040)='./bus\x00', 0x40, 0x0) ftruncate(r14, 0x2007fff) fsync(r3) 22:20:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000340)=0x5) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0x50, 0x0, 0x16b8456ebbe2f2e7, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffff}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x26}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xff}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x48c7b8bc, 0x572, 0x3, 0x0]}]}, 0x50}, 0x1, 0x0, 0x0, 0x2e96c391c7998d1f}, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r4, 0x5402, 0x0) write$UHID_INPUT(r4, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) 22:20:06 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/112, 0x70) readlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/193, 0xc1) [ 1745.474087] kauditd_printk_skb: 439 callbacks suppressed [ 1745.474100] audit: type=1400 audit(1574202007.358:260140): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r6, &(0x7f0000000300)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r6, &(0x7f0000000d00), 0x400004e, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='\xbc\xfd\x05\xfc\x0e\xff\x89H\x00', 0x2, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r9, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r9, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8200900c}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, r9, 0x4, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @local}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x21c00082, r2}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="93993974d566da0e3578d082d7ae73b9"}, 0x1c) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) [ 1745.649827] audit: type=1400 audit(1574202007.368:260141): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000100), 0x21f0420, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) [ 1745.834010] audit: type=1400 audit(1574202007.438:260142): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1745.992597] audit: type=1400 audit(1574202007.448:260143): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:07 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c6505000000c6e71f1f6583ff7f696003f5fbc10a652561029f300f95b364541a79865d4aa92adff277d0c9399ef2ae6c90690e4cf0937123a36b63d95b292336b2fed0b462ed5cfbb662f2f6cbe536202c0c6d50a0f279fce17f475e43f634906b10db6bace6c3d0c1c27137609de7eebff2dd13313fb90216b0dda63f06a65e0175246567e5a9a24e2dcabde89b64013423ffb0f50a8bb33368f33cdd5784ac1f6d"], 0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000000c0)=""/31) r3 = accept(r2, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2, 0x14, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x182}, "9f36cfa767ae2919", "2be0fb571fdf91f280cb02cd44f34f7a", "edd8902e", "8d6470e81993551c"}, 0x28) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x40, 0x0, 0x37, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x14a00, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, r0, 0x0) [ 1746.187345] audit: type=1400 audit(1574202007.518:260144): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.366728] audit: type=1400 audit(1574202007.528:260145): avc: denied { map } for pid=9762 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:08 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/112, 0x70) readlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/193, 0xc1) [ 1746.533008] audit: type=1400 audit(1574202007.978:260146): avc: denied { map } for pid=9772 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.678608] audit: type=1400 audit(1574202007.978:260147): avc: denied { map } for pid=9772 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1746.852878] audit: type=1400 audit(1574202007.978:260148): avc: denied { map } for pid=9772 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/route\x00') nanosleep(&(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="eef615868e17c4c97ab2154f5b4fdd9d26576052374866e66c993f7dfa56cb6e2d0fad432bd5d8568bbb6e92bb5a54177e0c7d60df72098a96d7e36ed8") recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) open(&(0x7f0000000200)='./file0\x00', 0x2000, 0x100) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000000)) [ 1747.054482] audit: type=1400 audit(1574202007.978:260149): avc: denied { map } for pid=9772 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:08 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1}}], 0x1, 0x81d184d36c29fb09, 0x0) open(0x0, 0x0, 0x101) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) dup2(r3, r2) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)) r4 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r10, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r10, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r10, 0x1) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) r12 = socket$inet(0x2, 0x1, 0x0) bind$inet(r12, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r12, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r12, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r12, 0x1) r13 = socket$inet(0x2, 0x1, 0x0) bind$inet(r13, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r13, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r13, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r13, 0x1) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendmsg$unix(r5, &(0x7f00000001c0)={&(0x7f0000000040)=@file={0x2, './bus\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000300)="458442f9bef5fd7070d69728c026b6f3512680ed0537ba48498dd2c0e591f408a9363aab282a27701ad556204db542717409320b5670b3fd90ba6645ced499ad3dacc7fe1f0c1cf42a69cc8ab44bb470cd289b6db71e1739978f02ee867b7ff7c3856549b9b1e4351791e1d5e13b8216799de05d91bceb29d914f13f3793dadfa68a440419c27d717831e94c23a137e36e6d5e85c095f478bf5205e6b33c03a19968", 0xa2}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f00000003c0)="4945a9bde49f11d681764780e16ab70fd387d173090bfb5c4ae6ed1b37a466b9c73ea5a9a7f3709bb5c49a44501a19aa7d02abfd55793cb6be877e237fbbcd6db9f39c0d2e100171d2525a7940a5a92fc1ef6bbfad98f1c1b870a94020f53664727415bb8cd15c589b7c2d7eaaa75cd53f799040e2965398ab1ad56b439ef37013b144c26c7da4c5420a8ed0a80fe0c04af27b3c65ed98d00c4d1ec4ea84504de056951943", 0xa5}, {&(0x7f0000000480)="b36f43072a0130b28806e310b58346bc3a50d352315af90cf3e5ccfa7a4d09039562403b62bd9a5fc0c09ac9249b34e44bb75e163e1f08e3916ad7138a2830e58695c734f1ba7a18028648275ad6eb95985c275cd7f4c01a1e801462baf7f57b84518d7e6a41b30a4657556de4140da0eeeee376d94604faeff73a1d8077d76da46e43c10f45e3bf1d57368af1d7f63607b48a98", 0x94}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r8, @ANYRES32=0xee00, @ANYBLOB="000000001c079448e5a63a9c4000000001000000", @ANYRES32=r9, @ANYRES32=r3, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14], 0x78, 0x40000}, 0x10) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket(0x0, 0x0, 0x0) getresuid(&(0x7f0000004180), 0x0, 0x0) 22:20:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000480)={0x297}, 0x5675536604875ab8) dup(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x20}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x5, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)=@random={'trusted.', 'system.advise\x00'}) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) [ 1750.477903] kauditd_printk_skb: 341 callbacks suppressed [ 1750.477912] audit: type=1400 audit(1574202012.370:260491): avc: denied { map } for pid=9837 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.509155] audit: type=1400 audit(1574202012.370:260492): avc: denied { map } for pid=9837 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.533721] audit: type=1400 audit(1574202012.370:260493): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.558126] audit: type=1400 audit(1574202012.370:260494): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.585854] audit: type=1400 audit(1574202012.380:260495): avc: denied { map } for pid=9837 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.608858] audit: type=1400 audit(1574202012.390:260496): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.637096] audit: type=1400 audit(1574202012.390:260497): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.662955] audit: type=1400 audit(1574202012.390:260498): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.690937] audit: type=1400 audit(1574202012.400:260499): avc: denied { map } for pid=9837 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1750.715423] audit: type=1400 audit(1574202012.440:260500): avc: denied { map } for pid=9838 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.483358] kauditd_printk_skb: 1011 callbacks suppressed [ 1755.483366] audit: type=1400 audit(1574202017.373:261512): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.514185] audit: type=1400 audit(1574202017.373:261513): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.562196] audit: type=1400 audit(1574202017.373:261514): avc: denied { map } for pid=9944 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.589417] audit: type=1400 audit(1574202017.383:261515): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.618637] audit: type=1400 audit(1574202017.383:261516): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.644680] audit: type=1400 audit(1574202017.393:261517): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.672680] audit: type=1400 audit(1574202017.393:261518): avc: denied { map } for pid=9944 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.697309] audit: type=1400 audit(1574202017.423:261519): avc: denied { map } for pid=9945 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.723060] audit: type=1400 audit(1574202017.433:261520): avc: denied { map } for pid=9945 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1755.745399] audit: type=1400 audit(1574202017.433:261521): avc: denied { map } for pid=9945 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes [ 1761.351308] kauditd_printk_skb: 996 callbacks suppressed [ 1761.351318] audit: type=1400 audit(1574202023.246:262518): avc: denied { map } for pid=10056 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.379341] audit: type=1400 audit(1574202023.246:262519): avc: denied { map } for pid=10056 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.403967] audit: type=1400 audit(1574202023.246:262520): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.428838] audit: type=1400 audit(1574202023.246:262521): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.454914] audit: type=1400 audit(1574202023.246:262522): avc: denied { map } for pid=10056 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.478258] audit: type=1400 audit(1574202023.246:262523): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.504815] audit: type=1400 audit(1574202023.246:262524): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.529741] audit: type=1400 audit(1574202023.246:262525): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1761.554236] audit: type=1400 audit(1574202023.276:262526): avc: denied { map } for pid=10056 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "5" respawning too fast: disabled for 5 minutes [ 1761.761306] audit: type=1400 audit(1574202023.656:262527): avc: denied { map } for pid=10057 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "6" respawning too fast: disabled for 5 minutes 22:20:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e", 0xae, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:24 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x10010, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x43e) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) setsockopt$sock_int(r3, 0x1, 0x3, &(0x7f0000000140)=0x6, 0x4) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x43e) close(r4) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x15) close(r2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'netpci0\x00', 0x4000}) 22:20:24 executing program 2: mmap(&(0x7f00009de000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x210003, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000452d65d26fd5e1f338dc26d7115e69ed9ddd94c50c9747b4c6ad325cf180e0781f87b04f71155849dd92c0f94812729396201e3f61098e3c9dd456ebd524e248413809169f87c40c07476c456810df8cb64dc207b24e0461101d825c132ddadc8cb4d15757269a5ada93b3aea9e03ac6c37666d1da2cc44face810e114a72ec7001d43eac385a244789604e5ded66878ecc4f5"], 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = gettid() socket$netlink(0x10, 0x3, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') r4 = open(&(0x7f0000000340)='./bus\x00', 0x161042, 0x0) ftruncate(r4, 0x2007fff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0xc, [@union={0x4, 0x4, 0x0, 0x5, 0x0, 0x9, [{0xc, 0x3, 0x3ff}, {0x6, 0x4, 0x80000000}, {0x0, 0x0, 0xfffffffb}, {0x8, 0x4}]}, @struct={0x1, 0x1, 0x0, 0x4, 0x1, 0x1, [{0xb, 0x0, 0x1ff}]}, @fwd={0x8}, @struct={0x6, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1, 0x0, 0x9}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @struct={0xb, 0x4, 0x0, 0x4, 0x1, 0x4, [{0x10, 0x2, 0x2}, {0x7, 0x3, 0x5}, {0x5, 0x4}, {0x9, 0x1, 0xffffffff}]}, @volatile={0xf, 0x0, 0x0, 0x9, 0x3}, @typedef={0x8, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0xbe, 0x30, 0x5f, 0x61, 0x61, 0x61, 0x2e, 0x2e, 0x0]}}, &(0x7f0000000600)=""/197, 0xfc, 0xc5, 0x1}, 0x20) pwrite64(r4, &(0x7f0000000040)="1cbac1541c17f32fcfa92951671faecf2da5237cdfc2650871fc8e7b6cf355f5040319b76280b280df3a5a1569c23adf136569697182b8c4384e89d9b05c872a8fb27c5365c4ae515bd2332ba9d988e324797bf672c0", 0x56, 0x8) sendfile(r0, r4, 0x0, 0x800000000024) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) 22:20:24 executing program 4: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/112, 0x70) readlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/193, 0xc1) 22:20:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@empty, @dev={[], 0x25}, [], {@ipv4={0x800, {{0x2, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x14}, @broadcast}, @igmp={0x0, 0x0, 0x0, @remote, "f3008d375d0f047dd6c32ce7"}}}}}, 0x0) 22:20:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') pipe(&(0x7f0000000280)) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0xfffffffffffffd8c) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./bus\x00', 0x0, 0x100) fchdir(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r3, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @empty}}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x1004d191}, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB="40000008837809cf392242e6433dff67c6875cdb42040811cc481401968dbc9ad9ab4acb492778e6b292c1e60eb04f440ed3", @ANYRES16=r3, @ANYBLOB="000826bd7000ffdbdf250300000008000600c100000014000400800000000900000001000100b3a0aa5208000200020000000800050002000000"], 0x40}, 0x1, 0x0, 0x0, 0x4040}, 0x0) ftruncate(0xffffffffffffffff, 0x208200) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) connect$inet(r5, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) splice(r4, 0x0, r5, 0x0, 0x10009, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) connect$inet(r7, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10009, 0x4) pipe(0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) connect$inet(r8, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x10009, 0x4) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xfffffffffffffece) sendmsg$nl_netfilter(r4, &(0x7f0000000840)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="240000000600000426bd7000fbdbdf250700000208008b00", @ANYRES32=r7, @ANYBLOB="0800c40027fd6c287b0674b649c34c0ee1d42e5dfcfb44a100000020000000", @ANYRES32=r9], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x1) r10 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0) mkdirat(r10, 0x0, 0x13) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x8080}, 0x0, 0x0, r10, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r11 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r12 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r11, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r11, r12, 0x0, 0xfffc) 22:20:25 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x2e9, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x4) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)=0x7) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) r2 = socket$inet(0x2, 0x80807, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x9, 0x13, 0x11, 0xffffffff, 0x0, 0xfff, 0x3, 0x71, 0x1}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") 22:20:25 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x3fffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x2, &(0x7f00000004c0)=0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r5, &(0x7f0000000180)={0x108}, 0xffffff02) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)=0x800) [ 1763.421186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 22:20:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0x4}, 0x300, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x80000000000004) lseek(0xffffffffffffffff, 0x1, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000080)={0x6, 0x4a9, {0x605425a20de0470, 0x7, 0x4, {0x5, 0x2}, {0xffff, 0x549}, @cond=[{0x1, 0x4, 0x400, 0x4, 0x8001}, {0x0, 0x8001, 0x9, 0x8000, 0x1, 0xdb6}]}, {0x0, 0x8000, 0xfff, {0x5976, 0x5}, {0x9, 0x3}, @rumble={0x2}}}) [ 1763.521212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 INIT: [ 1763.618159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 Id "3" respawning too fast: disabled for 5 minutes [ 1763.691194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 22:20:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae1", 0xcb, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1763.738434] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 [ 1763.803103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 [ 1763.884942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 INIT: Id "1" respawning too fast: disabled for 5 minutes 22:20:25 executing program 5: mmap(&(0x7f00009de000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES16, @ANYRESHEX=r3], 0x3}}, 0x4000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x4) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') r4 = open(&(0x7f0000000340)='./bus\x00', 0x161042, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000000c0)='vcan0\x00'}) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) [ 1763.990176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 22:20:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae1", 0xcb, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1764.070070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 [ 1764.139556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10113 comm=syz-executor.2 22:20:26 executing program 2: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) r4 = accept(r2, &(0x7f0000000380)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000400)=0x80) ftruncate(r4, 0x7) readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000011c0)) sendmmsg$inet6(r2, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="a56d40fd8bf490b2446ad3fafc3f55852c2f37d0bf981430b1495c6aa6447422ac6468abe0df19fc9c54e66c49df5e1e52041fa6e6e23630ea5a186e26d2800c926365a411a839fae371ef792917ad8455", 0x51}, {&(0x7f0000000300)="18c80c737ae624b1265ce6300daf54f076a8a185d0d3fe57eb340ad7e85cf2a20e87f60cf1b8be95cd948bfd508e3f5e8f4001340f6617a1bf68965f5274f3e3936cfed209d10d23077955d684c8a2c9ae47af4030b0c55cb4", 0x59}, {0x0}], 0x3, &(0x7f0000000780)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x2c, 0x0, [@mcast1]}}}], 0x28}}, {{&(0x7f0000000180)={0xa, 0x4e23, 0x0, @mcast1, 0x20000}, 0x1c, &(0x7f0000000980)=[{0x0}, {0x0}], 0x2, &(0x7f0000000b80)=[@dstopts_2292={{0x38, 0x29, 0x4, {0x4, 0x3, [], [@ra, @calipso={0x7, 0x10, {0x8, 0x2, 0x8, 0x1f, [0x81]}}, @jumbo]}}}], 0x38}}], 0x2, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x80) getsockname$inet(r6, &(0x7f0000000100)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000013c0)={'filter\x00', 0x7, 0x4, 0x498, 0x130, 0x270, 0x270, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f00000001c0), {[{{@arp={@remote, @broadcast, 0x0, 0xff, @empty, {[0x0, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0x0, 0x0, 0x0, 0xff]}, 0xe8c9, 0x5, 0xabe, 0x0, 0x40, 0x2, 'veth0_to_hsr\x00', 'sit0\x00', {0xff}, {0xff}, 0x0, 0xb954f8318f7cbbd1}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f47ed70b26fe270ebe841d65abd1f619e041714112b0a52deb0d35d42cbd"}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@remote, @broadcast, @dev={0xac, 0x14, 0x14, 0xa}, 0x9068fd53a0c97757, 0xffffffff}}}, {{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x24}, 0xff000000, 0x1fe, @mac=@dev={[], 0x26}, {[0x0, 0xff, 0xff, 0x101, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0xdc9e8a3393f995ea, 0xff, 0x0, 0xb114192de071c7bb]}, 0x3f, 0x3f, 0x6, 0xfff, 0x6, 0x7fff, 'nr0\x00', 'gre0\x00', {0xff}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0x2, 0x100000001}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) 22:20:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) [ 1765.602019] loop4: p1 < > p4 [ 1765.613352] loop4: p1 size 2 extends beyond EOD, truncated [ 1765.676089] loop4: p4 start 1854537728 is beyond EOD, truncated 22:20:27 executing program 5: mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x40) pivot_root(0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0) prctl$PR_GET_ENDIAN(0x13, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2, 0x0, 0x30bd26}, 0xd}}, 0x800) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = syz_open_pts(r2, 0x0) syz_open_pts(r3, 0x10000) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) recvmsg(r4, &(0x7f0000000c80)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f00000009c0), 0x0, &(0x7f0000000c40)=""/15, 0xf}, 0x150) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x80000000) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x28, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x136}}) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(0x0, 0x0, &(0x7f0000000740)='system_u:object_r:getty_etc_t:s0\x00', 0x21, 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:27 executing program 2: setrlimit(0x2, &(0x7f0000000000)) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) clone(0x20986900, 0x0, 0x0, 0x0, &(0x7f0000000080)="03846bd5527d92719207005fa8b2d94c22") 22:20:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000d80)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x486, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0) [ 1766.359056] kauditd_printk_skb: 402 callbacks suppressed [ 1766.359065] audit: type=1400 audit(1574202028.238:262930): avc: denied { map } for pid=10167 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1766.506864] audit: type=1400 audit(1574202028.308:262931): avc: denied { map } for pid=10169 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x6) syz_genetlink_get_family_id$nbd(&(0x7f00000047c0)='nbd\x00') setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000000)={0x5e, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'dh\x00', 0x18, 0x2, 0x52}, 0x2c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004640)=[{{&(0x7f0000000140)={0xa, 0x4e21, 0xffffffff, @local, 0x401}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000340)="6a18eb4fc7725ff7d285305314e657682fad50cf732bc2f508daccdce8c515b82cdb753076cf7ad74c2be47888b5019cced8a02d30efe56184a0f950a1bbbcdae4bc949aaaa0f166873166e124f2ea61a3ac24890d83bdd4946dd5fb5e43337fac0e8968ee141c0c7d5c95fd973598be75c83c667308b49ba6cc384a9a7c3ddb10e8ebe2e546a11d49e936834de54f17ca3f6345adc9509ab589a88af53efe0579273731971bf81c07a3fc8a2046e043b69c21be515ad167b2fffe0f25d7a665a89729d4e2d2d3d4287410e680cb054c87324d5f0c5d83613a2c40502437e54a1f", 0xe1}, {&(0x7f0000000440)="37ae280e52c0b58af14c2c5fc4822477785539c6a525724eecb02aa8fb75dc0003aaae4f261effa843606e34dc8d518f7be7a603c854f414a7f7d49189b3ef1264fb193e3a08fb830e1d7c805d7341e8c39fa9313b1c62297aafbb37afe941cd4348428b96a5eba6afb38ec729383149734b99db151fa02e4f5633eec721de1e70fce948564ae271b6907e222f9cde04135b4bab0a10e8a9f54df39a8a20d93662967ab27b88852ffd66b1707197c6d3f06c9f4c6ab3bd9ef13cf1a524b4d669f33f97466204435a1b1ad3c85ec5191d981c81ff2e24938f56e6958df838834304666b15df03ac6e4a50cd804836a9fe04ecd313e4d3c751790191d08e6850062a87de5d48d7cf6236669ad0f172e2e9279d77f5d5c6b5f3cfac071810b092efaf40479ff5c69e08ef03480a79ded967f3199f158f6b84b564ba80e06f4618391894ccb05671fc42efdb8d14a1ff6fb5dbc58711489fe3fd1966e086dd52b461819befe3c361e90cf8f41105a406f36b9de52481f3bcfe02bc4594f8e01488f9bcd2426b614673b514a7bf639b17f0514a33f1f1232226cb36cc49abfea5cc54d38d3297d6ee88705ff6e9c1732b4d092648f7ff5374d927eab941962d05317073e1d2267dd094e291db9d9551493ee4ecb0132cb43700a19e4f9a80d7e82e0832b529ff5cc3212ac5eea50a56349ff64bb80111e1174d46ea882cde6833188f44a50a1dfc1b571436c9195c10f1adfed07a2194e6f162c5a0356c13f729a379041fba7e99d151d639afefbeb4316ee44a81a7fa9ff4d5c3df9569f1a2a2b3bc3ac6edc7899f5105806a060812bca625969bf607dd97c12179d426ac0660eea66304d3dad1fd2ad54a46c5a50902ca2db6ba62950836afd6bc229c0d7a8007f7164b344ba0f36441632a79708631a403e162d50bbf555b1aace83848178b29554d63712cfa1fa534e9b34ca61e3f8e90f47dbf6eb3391803201b2e99aab5f9915168d38ea53e1b88da78816acf5f4fa4bc0dbde8461effe439c4c965b63067aee0d6f8697696a8b7321c72ca1db6ec41637e603310446d1778b8892f2a2f6b028dc66b7d9966474aad9cf99d752e0709fbe3f174d0baba4851286e3e10e65aa03d67c184982a4b7ee074fdcad911473b96861fe8a22c61a7bccf3ce7f73875724ab59686fd4b622014ad15b2274ba1b7a90edad29b50f0cb07123a947063c3d1ad75f93fdeacf9f78714a5181fe84a1644daf9a9a086f1f981525ed5559cf27a6dfe5a585ba63f9fda052d15ec54e8fa10b561c4b724a8c9fce30be9b79e6bbc98ad132c7cbc984af639fdda478640051ad575b9ccdd1cbf9ac9392af9d2a10f2ce46083cf9d4510f73120d2a09e20967676eac74aa341d7ce6e71617f58590c77ff791e2ebad3148cf827657ca781b1e1d2c81b8c9c62df837bc7706fea0ac0ce9515372199b5cd0e6279fc5b7839914a85c5bff2728e3104ee3326a3a79f7beace0a6f44659c4b23efbdc0874eca4750519475bc98cbe9ce7af4d5b307197af0c0867cacc457269661da921c962fc02b4bc7789e4b924da8408b7ee640dbe55db32cd7edf2652794206e4a851d61934bce09df304172992cf4279d41c2624f36ff59927bf25c2ba871111307c4803cfb14f9f94c306a1f3444f6d0b89f1022c1fd7cea630929293403ec1ea65dc302588eb4f0c33edd121f1ce6043b362da309edaf46b7f6b36705606f432cc4ff58ca8e7969b97f730133933f9b53a79536e2abc28abaafe5a50248dff793235b3a6f4c0a39748ad57ffdc4403ef0a5fccf1553fec23a31d14b92cf22e6b0fe7aff3e8e03c970399cd5e93dfb24b1540a8bf91d146afe0dfb68aa85590385f34b5b89a8b6518d444ad510ed5474f0effdaa1e49bb0a0c644ffd064045118ba0487df851f396c01adccfde1f9105c28898bd8797c960dee5963fe9a1dd00adee49d6c94e27fc91a83ab64f035e7f31e0be9ffb0d53a20a7cbf520d2abe01ae89fef9d655e7fcbfdd9919fae559084c7c37caf1929bf745ae507ecc4af61d1b5957b9319bcf183b54d4303c6f975c81692e717751ce929dbc356526c43505ed864d717e039750cca8ef35ba6436c5df1f3e6d5624e6d40ff91e4e0760a92bef3ba1a5ec436f79ae6379e1890e319696fee0f4e7827887f50dd4cbb8fa9f88c531ab16a48a0ccaa057f16c15cbfa1cb8510da7e39e11d367b54a930709109cc2d2ea8102e4e45f0e40e4c9d71ce7d85bdfffc35b02c6e50b6058d6cd3853d01c72a1df7ce66547a76e43d279ceb0b5fb966017130e88152f76e7ea32581cec7dfb19e2434c56bbd36d179b2e1cc781a84c6a33a4d3be6c622ef35ea50dc4e6cefb280ff18f820f3ad5668dcd02007208c803efb95dd194c01603307bd478769e7b3d6216b90a3942d7fbf9be58c9dd5df73eb46d5d72bd0aa17b6950abba1d7ae3fd7a408131fed3105662594e6177c750d58371d796134229d398a6cb773d895f5b3a814f1e32057a185392fd3061cbff5e63a2682ed282d88cade4752cd8f35a0038829b733bc5d31ff3e89fffdabef2d4b40453d1c4c054bff6cc840e27e0b8a9d8355d08ca52dbb77d2747a463435709cc2cc46e9f0ff3e5e711b6147afcb6196e0f663b3b6fe0e0559b0e7743761842b6327ba9a07979b9d6a29cb460b376959ea517d7f84fcc4bd0272d7cce418887130057b755c8cfd5c221871f4d74f4a8f3dc5b244bb0ac04044cfa82b5d5cca64658ac9a8f748ad36ccd12138b125045fb40adf392ae9de6e24f0cd93bfe3639c5fadf19e91ed916e59a9c5876cba7cd0703945a04654557cb6caf2aebfe3882f88793233b7b9362648d184f0f00c649acd858d355f0dc42ce7effd3c3bac02a4dcc1c4763e155f8e59e891b4cbb22b98ffe72816a265708c81d7cd1ae4121cb788a512e11f8fb3946b71da4ed600c6452b89ca39d6db0897a5a0249ee461f25fffc1c3117c47029beded072939ee5fcf5109b3e1d0288d56ef5434caa79dcab00f188ed314844ac99503a963c74212fe6413f454af86ae5cea19db86db2c01d793db6ea3fae9a6053da37ca3ea02b0989f7e5b6c695ad99adde085f7a2d73b703f6a34130ac0982d23c9fca9f2876ac232dbdf441fdb85d4c3b7ec70f227268580ac8c223099687183a6bf9573717187c12519bed5636744502621d01c235db72dbc101bc3359a3fdd93095f9e7264774880aa25e11e1202f668d8a58d704b50209aaed946cf30cbda2f775713ff8234106d756893add4eb73d67667943fad626ed71308b0ba2c05973d79a4c913f9b0bfabc4f01214f5e939418956c3d368fd52a4eafe6c640492f45d240d24da259a74f1b4f3691dcc3bbbc0e323e93fc489f5e3e6ec0f58e36bae3211b40047a152e9c65c4b305683894384f14552e49d6343a1204069eb761b253b0c498255b9952d745813c1a6517879a7f9a0d95aaf8354e6684c6ba7b94ab64f2835b3146e2c66a32deb1118c5e1ee0b3e340b76a2dde9fd75d6dbab78effe9efdf7a85b8110d70e1c012ef5567af46b6393ae0be2a19d4c9a664bd2cf895cc22b091f56b28b7cd000db269375deff75be66ac58e6d9f20239916e9e44dee417a189da81d00f5b0fd3d9b3152d55bca7c3274a878bd1d2020c0756351c2e95396dd31201102d9bb487696d0636d2c089ec298841438229e1ef8ca9484b3ebabe428953286e2682efda49fc2090fc72f1995fb9378ef26c4977e308c8ac16144d75bee604d8c4712dfa89517fe575337b5cf5d61cff2a07fca77bcaf3eaeefb2dc3c7561939c8ed0deb071b72831bcb59c9e0bb74a5b956f085d45ad4324f6580d1339f3929f08d18c84864e8fea8aeeb09dfc38dd47d44f576327f5bd25ae5977ef5862e7506f1ee42255d8a0852f9ca15d913ba2314fc35a206eac4fa841e710f4da66e94822fe8b903c1156d9d69d2b9cdd05ac6f1f5a0f31b9bbec09998fc2fa0ee171b19b5d146496cf4631896c098a3a1011760abd73204632b96b0fc7c3d3698bc1f5cf6fbc0e16abd796c44b7197a067fb83dd9bbd04a9ef7460475d9e98aabfcc88c02c417d09abb5b41a78363c0099e789ec131b921093cec6b1bea58ad5f3b6b9f6fd1a21b80ddb42ffc9ab509fe8367479b8426bb438d857cb2ad102619cfddbec5ccecc990b0dd1420847497aabf068c6dd7fc477b20058778ef56fecad11f2abb0be3fef2271ffe0058b4ba7353b31fe47404d7a15854acdab0af1a1764d0be339130b688f2d515dfe6dcc1ea1381b8b8222ebc10d3952d8e0613982ecd4f5099545973bd4c4d743c0821e8a845e1f968882514ab7a6013dc92187ce23e873d95139c042461a0aea4d7202b2780e505073bb821f4e5d451a784c830ff2221ee6ec7e850f9b9968b2c601fdb328b6daca991520cb42a36c62e6fb028c0b90b251dea86f6de04d6357a344095e382d6ca8e4c65866edf9a3f69591d3e51d9add39e950b7c362692a902ef119334eb1d4da17be8f840acfc59595a6dd70b0ea1030c12ed83b17a505606aed6a8675d520790b5499601dbff87d2731dc7b008d5996c4811f8780c1c7879024f002659d38b6422feecc79e4d344b76079acf4c28244def0d565786cd881837b67527169ed8aadb1cfbaa63d1d033a3be32eb23ec7eb693294a2e93ff507757f6df1cd476a6512f38b457ff8ba2f51d4bb111c2466f1230c08a0daa130f0ee661dbfac6abcc231b460b5ff6bc963613dca659ac97e6f3595115ac0d48de2bbd5ddbfb22471e2410ded325f44da4fc2badc639d70d8d855295231211c7a0a8e83d808397baf0d600f622b5aeae7f3199e52ebcfeac8cabd495d27ac1f8210ff1fcce4f693a49bad0a97e97cce79f254015aa4f44480439625d53b5ba09410062c47446c34c8acedc6d8c8af77ed63ff02982953fd964dbb885d4516d1da71b3633176638a7a6cb25691b2554773862c1bfae4b91e9436d063e8fca8bce39cef07ff62e3693c3b8649a40d3dd038035385dc04504c564a59794adbc87880264a83b58e1f1a04a46b2daa46a241b684fde46b1b03bff31b2351e2adb67ed8c0bb9d7bf14c4d22ae3170861e25246fdcfadf08940cb74ef6d53c1defe350c9c7d12d5c6c9db655009221561e9412ad6d44f558ca93a82e0727d848c2f736879bd1e14461c2bc07615aa7740ad8235a432b1552fcf0ac5400462051a84564d434651c51cbf9203b3b853f69ab84f13afb5d832fbf06147a901a321a3282e5803ff452b5825bce0e1a59b6f018dec8037a0c09b953d51f85a7545c34b91513cf90a70860d056bfa67a1313ee4b3fbac86f0287484f1040c363bc6919f41b80d8a177464e48958ef8abf560e7f2cc6d517943cd78b04df399fe6a5f85bbb34231a2f1bd0c52d970c6619ef3da689ac1f5a75727ffb61c78b1c8268ab42b086ac946a9eee7d0b93c75354a121e5c9289c39020344970b3cf92019e07d5ff8afda6f358623279fdfa42fca7a5f7c42d01540403b45c0eaa65a2be3326c3405e891a22ecb1e72511fe0d40fab21dc7bbb266d9708df2608529ae2a6e63474eac091448aa49d4fe67ad6f85b5a7d651140ec835722f82eb95789070d1969a297f11d4f6d13a42e1e378f7bb9d076579775d3443fad1b553f333a66444ace8123459d291fde512f3ce842ce6b6b6878ea3fc06e92efaf330ba1f8964c3703a9a6bc2cbc78ece6b3fe3b5db716d545396c295732ca3d2eb428c16d28fd0ca9b4393607d58a68a11e4e4169f86", 0x1000}, {&(0x7f0000000180)="3533a1a530a589e760506fbd81e9fc39f13a7532a90b899e634096e4641fb73d0a737bf1f662a3", 0x27}, {&(0x7f0000001440)="4d734698320ec6187526b39720962cd9ef0b184a421513cfc301fa79356682c653449b76f280c03cad279f88b9437b29af0a0decdd6d6682140e180758ccebe505193091dc60d34693722176eb7e3faea8d7df9bf4816c731ce60e28b2dde1b5b5a445c2d296baa2ded69a63ce9b1fa2ea78229128b52e3c2c7f18eb2a04d68a117f1e93e5ca5cb0fff906243e327710fb94010bb8b6c0368e9cfea74fe102a022857307085fccf377316c067fc5ed51f65b0fa32c1bbf8ca5be284bbe8d72535d45f5a48787d67b43d4687e595546119b302c45c1e27a0b96da8a625fdde7036abdf4e2f9fb3d4803314d3905593e", 0xef}, {&(0x7f0000001540)="d094d84878ab02e4353054d8afa404faa1cd38ab588b4b1d683cb0ec6830e8f968a78025da346aee698010d1e42072ed7578cffec9550066f2b7868740f28cb5e38f505a1b8131557fc788705ff4db783098a10975d14b5bb806ef2985275b3a6342b039f25d0a239356bf5c320f40a975e771f40c6a1a0f3e705a2cdadcf7b24beaba96c3bbf6e2d94ebfdd468544a9ac49556813b8574f6ccad34f16d5975179d1b1ad850f16d86a94179fb7a1be260265530762ca4ad746477c4d48b00fa83a1bde5973dbbcada39c886b5b66e1662ca63e559ad1609b90628e9f71ea4b18e3fd0901fe33b086ce", 0xe9}], 0x5, &(0x7f0000001640)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0x0, 0x1, [], [@jumbo={0xc2, 0x4, 0x28000}, @jumbo={0xc2, 0x4, 0x1}]}}}], 0x28}}, {{&(0x7f0000001680)={0xa, 0x4e20, 0x1, @empty, 0x1}, 0x1c, &(0x7f0000001900)=[{&(0x7f00000016c0)="73049c93bc657f7568f520cf6eeefe78c03b27f3797e0277ca3243c3b83ab2c295f392f4b5fac0f8b2b79f04316afb310b7b9fe6d7afb00e9ee0c8429490b4db600966ebb0f6d93f97e8d5ac7cf1c241bd5bd99118d39aa2d3965177516883bdbbb4edeb35211a59f4b7fc84c4cf6b148974d7ddf22e2193283e6b7ad371e3966a93923b06f58f519589b6bbeb28c66f56c496be351beec8e3563285f31981384e5512564e60789ec1f7e6c07a7eb05900f9255e03fe54546a0db198fb51b156107137a80d46de04f8", 0xc9}, {&(0x7f00000017c0)="92c7507987ba676429836969acc8c866b1fd2db7ab0d6bacbc440fb90b2c8fef0aa570ddcf275077f3cef1a4577c0a377c166abcf3df0d1b870ab8b8fed95c8fff58f99f1431910ee719aa7519f07df64bb1c266f71a906e0414af2fbd8b14becf4e153c25f5d179f81fb7b4", 0x6c}, {&(0x7f0000001840)="dc4d359c486a10d5dd06ce9981a3772841ed9675e90bb4e2168fb5f07a0cd0932e37c80e2b7e6e4841c100cd024953bb2babbb57ec3ecb85d10ca80f8fd1c4b6c6d9c4365ecc10fc17d07fe30422799886fb05c6635df303f12fe16dc0ea37922c8d36847f7546ed1ce59056520b948f25e2fe3d148e0db244658f0aed8532ecf32a948eefca5a25003afbb0a03e24a47554f2348ba5d04e7e2e51ef8b4d4ebd6f24e916bd435a0a7d3ac1d5e33b5e764d75c7", 0xb3}], 0x3, &(0x7f0000001940)=[@flowinfo={{0x14, 0x29, 0xb, 0x5bf}}], 0x18}}, {{&(0x7f0000001980)={0xa, 0x4e24, 0x1, @remote, 0x1}, 0x1c, &(0x7f0000002b40)=[{&(0x7f00000019c0)="68816871e55e3d2ff7605ff48a01a2d103f832328d7323f17b2afb38919f2cc6d9e8bc142407eb602a92ae76edab9a487de5296f2b60463451169d22fb8f9846e93bb02946c272e9db7c", 0x4a}, {&(0x7f0000001a40)="eda8479e7b0f2b59702d9f021c3640cf66a661c1c0c47797358d1773665d7eece0d1c03acbcca1c24771c8e830d5f641d96bf7d4c7808d82e4eabb2d17b0e0266cc3deb4e8082004a8bfe30f1d4f7842da4ed705f0803229e95c0be18d66bbf8c87bf9e7667fe8fea581b7b0c396a91864a138172e5b8ed9dea99f77e738889f1e370b5573bda38514040aa898eb586d81da183f992889b9396de36966f6ff23ed5e19fa83c6192c0a051fae7069ae7db049a979987b57e13971ced2d0c38ed37f902558ae606d6a3abaa9c1bfb1d97b446907fb87629cdf563c89a27858b3e39e0bd9831ef87620", 0xe8}, {&(0x7f0000001b40)="6ad0028b4515fc113b4cd7cdc7a86b7db068815916db9cb3cdf4f46928201f01e8347603751a7fb72eb825854549ed24eab4de9d38e9f71565d570f33523494be7c27b99a4e1b14bb95a82817d6efa4e161dcc1d6152ae48fea3610230fa0c2ba9c38c9aecda4eda6e69d9832dd53ced1ad72c7bf7b022909806bd837c7da488b69ce453fac44e4c0590760fbac25b479075f9f5752860b90896125fb05277309b7dad9be69221293a36e17d8dbca73097df1d6aceb36ef7fed0ef7b944dc892c667a30b8e31a0a27f8a8db39e5ff6f94a43ff5978d8d549e474481b9606dde722c4054f33a3ce0e53a99debbab8f72aceaad56e1cd64ee741bc5c45d73dcc89ff6a4ef0fea64b2e26fe880a957f858894bf4db9af918b96393ec3038dfd7ee990e92b8fb2922605343665d9c8654f16624829000518eb83af61ebb3f9683a694fe6ec703d64b0d1fd22ea94fa218374dd953868453e292f31e2caaee1c3a34c64b43fc8adf9989884aecca8c4a3e3e8a80d2475879422ec557d9532f45b743e095118fbe19d12e4515c7d55b8099418ef131bd133cc848918d23138562b8b4378666b3acee11f3480892495449b0ea4474b5dd307aa71d6114357e6264c9fb64ee6585f451d8a74e77f031964f158a9202c239cd4092a8709ff728c592016a6bce1ed18bd1a10ed783f0322fa40a555ce5a4ca46d6baf2382114c2200bfc2a0c2ba0243eff7ef8e806a46167e452136f0f56a71de5cc046b2ed17b5149b9f33f9fe6dcb69f93b042eb596a53cffcb50ba5477ff0f42b87eb395a3d014820f10d51322a5456e1fe60a11fdca0a35f2dde1a799d00e483e34eff6980ae591fced44e0207e7e414f657b08b091564c4154b4e60e56a44aac668c7817f5c8e3a5cc1d1e11998f074b51a57b03da7be27f5ff3e8ee50e5d9b278b9c150b37801557bda6aacbfb2e5173de39b53aea65079a2614583cc8c7d2a1ed7e18b558f51c7b768d4e54aae5684df3feac685bb623aba8e7a624f1068ad237aa5027f96097a0e46057f1e60225630187f0e2c4eb568a71bb5d663401dd319848b9fb374717140d27bf533378f94ea5a638fdadfa7f05a80e025d0f65eeeed5e70e6db6347d8e79e9401f9a27eff3fd040a0b5150a94e977f957e6a43f431f7977d12cac19e6ed15bfa3aba3dd500b2751805e890cacdebbab823f7b935661a36757d408d7bff1482f9898775977643278002e8a6a1a90ad9299cf0f09d789a43f0b3d8ed536d13de075c0e9ca4fe19df251df5b18fa0715461f17b17a8afbb2902ffc42b64bce46df582bb596aab09aa4554bd4fc75331013d3f2fedc144820ad493472499dde56a00d31c62516aecca48950f873396fc58c496ddfd043d95cd41dbbe030a0430ba67644ed234cff80f8faba892b22692262d6b3eae5ab6f0249b76558daf8e00d86f0a544605253a2a821e44f8315b98b304ffddda865a62db249b5277e5e3e41d83f6aed81d3d66c62894bccbcf1f914c231d603cd06083f42ccfad62bb051ca64111500b42cbc5f7c99cb6d516fb448626310165301d31c7474801e4bac6f98bdef72366a22d6cce97dd51a2a0eb0e7b3a176f4389f29514a2d14ca299d138e1b5e03c94b0e063e3ae5473c5a26f025b5e08502a148027641c365626a28d01b37eb6485d161950daf5b393134942d76e0b06774f3ca99a633af3adcd0e9ba13319151334e429050d03fa081b39e51c564f7b27b728ca326e49952339d40568ed625d8752a21e8545faf999d608f942cf9f65c1da09b06c0d0ac73bcdfa7fdd3cf22899802238f0a55f85eb5d27c592591537d236e7e2a352efdb035163a7e8d717afe546187a591f43704176138ecb9a32850d39ba54e7c6fe1205446cb37fe94e192f85afe1e884e6f1baf3ed3cc06a1c75233d3ceb047ff300e3cde9241303e959b9fab3d5c36ab4f53280ea62d4fbd8ee6d125588147b2c4e11cf311ad45e8ac44f4f3777069f2ff421f5e12150ce60102420c6b877d0f67916123473bb0c861846353ac7054f7a04c710f49e37b9e7667f8db3204fc64846311f125dc5d0e7828c1eb58fc12a76239a4f660974dad00a15a0bd7e7d05c0ece76b784db323b24e07cca542a9678c3f56a2da5569dadedd753ff26d378835cf14fe82fd6738525abf2c85136aa151c806f3212b710a7c12066ad4a433d548a6aa852b1d3fa33c219a2391c4bcebe7ef6246e85ff0ad7de59cf973be47aaeaf1834b8a5439330e716741f9a2647772a6b4b77afed9ad447cb77a4c9016740b3c8f6a71ee053f7460cb38627715968e37f9152971e72803b724305516a0e806176d2874de7068f287c67a5fbc5e3d1fe919e0eec267076beaf12fafcb7b336ecd56ed0b0dd7a1dfb01b76fc8ca0416dad4e3d1d88f9d13d977d76426c9e5c978be981e7ee1a16a10add11ab2ffee7a3a9e8d1fa20d90fe856d606114aa463fbb2c634209efb2abb1caec69111521b5a44b289ca8aa9112c02681c5cdcb6b59de266093fec08d881173a8b5953483d3bd8e26e315a6b624ed999fbc62f86a5950f85059ec26e8a1f8f56ea83e9b137cf40c1d46a47637f1e53d8c2fdd432f6811b29364c513d630af5384f1808f4429474d79c44cd13d898c05b70f255af7f3eae64af27483bcbc5de0ce9b33d357609f699b72014471a674697a31b05c9f56191895cbd0248fed7e8fd4cbaae25f468578d70a74068a2fe0fb170df37834c5f153d76946eaba5109b7091118850522519b14419cb77e416f2fd5851f10c9342517b2751308ce33af792314c05d75351ca0cd3e4cce9f3050e2d22a9bfab2b25c57929fcde7f53c437961d8d17e9c4682db8b755816d6b4adf4d757f08f248947066e70d85873f297237a2e3621c30ca54f35a977795e04f00a4fdbb992990737ce7f4cc072b52f4cae84f7b9749fcc93f4efb1f03ad3e9425301458f0ef8214b6bc4a222d7b15cd26208e15973bbf35e7be038ba63c0c4070353abc5f913a01a9735a99bc05762357ecd0845d07013735a195daa842a7edcc38d18de7027e1ca47bc4c45fc7834c017a3977d7f1b1e4c3d871bcbdbfb6e474d270fb024910e5fba317d4e07377245541ab2343aef5e303dca8757e0bf021d815bd31280c5b8eb48433222efaec44e22b5fcf67878acb4b66a4993858909a6f37e747fcfddd6abee281a25525dc7acb887ceef7ecbb044fa657ec63d5eb4ec55745d8f84b5891cf1ab3b53d233d2b564639f21f4a6ff5d2ad74600766c4c6a6e88a0f81beb3bca3e6eb38a18e46fb2c12402dba80dd3a6c5ee215950713a9cad0f99a100b45bf9f637f8a1a3e584b42fbc135bb1c49c6c74076c4db3e971825327d5acc4cc9919be0edef948ecd238b0b8e9df48cdd02e417a4b4f51e544fcd53b2f01b02ac00cc4b40683932623734a6ccbb4f2ed1ceee88e60c27dee5e714c4680daace82cd1e0a14d2ea20babc2cc3ea79ff44dd85bd87f7e4f8c91c377fd63400c2b2dda457b303e0b139c1ce2eb1c8fa669e0642186ba45779396222ec854665896cf92c44a823a6e237207997abe2857de15624f83f99c21b0813ec2c3c67a462343bd031b64ab69818f676cf6668de294a70725303248f2d114a3018ae983b0eb29cb16109fea4fcea91bc58d8348fd6d5007dc977cba822a49355184ecc0fc8d5b692a3865bc094f8db5b4fd85e0183e463636846c8f0f775792798b86ada27f3a0ba2dbe4e0c5c0a58095fc825df76fd072e94e678658584ddcdc888c727b784f059fae8d3bbe048132f280ccf4a3a07cbeb5fb76a440577d68777490fcdaac143987b28bb13774d9c0c07a2d9ff396a046a8b1195cb0ef6713af167703a1b295686f91811a3ea6eec7424405a9117d3fa1355ed9dac3359278e07004fa00ce4babacded20042f0c7563ad160d1e574b51ccf4c654e166a91ba55c18a6e4de8ed741d800047a45822c792dd75fab5358274facea3bb8b2883ace8c8c9790ea84d924f69635538a19662c6b687e0fc2997dd81805a3370d8d8500e44020218da43fcf604b2a20de0f1f5eed852db3ec83e9f6490b72bf96703790b295b1465cdc86328e2c0c061434a0df7dc2ba8a2487e98357a22e557320c0fef1d9d7a79e2ab9bb15802f29f3cc7ff9e018a671b884cf6ca8ed0e68b2f3f1ddf021a6ef557fb75b4ecf4184825dc31973387ebad9e4980ad8f1fd86421e65c14e84fda63c030b904b68f12a59cc29fc468ff574b6e83c4a9eadcd16c23ebeb9c7d7306593c3d4b65e9645d6ee95905c34d3cb8ededeb39933b3f957e304e39a280523b7ecea086fc719994f021165386946929639bc1494d9cfe4fd3351c99c4f61e8226e210c8f02a0caecf28456597045770e2ee0c6f1909afdbe8cec4c52b1a1ddf77cbbb5c2704bbc956e3e072cacd6d59e12d3d9380f0a1d3528e1eb4b8b55398ff828542bbc93c20ad88ce6f6f72b63ea90cd4ee945b2ab39276e64b98e15fdb93cb1395a8d56471b3014ed29d72669ae8caea87332d13841ce87219848ac187f476f2772e304ad93618e5f41b64e332ad3b8e32fa217b038f9fb855bd1ee1296be7aaec5c9270e4980aa27b599646474a343319086c3de76af2789f2750da7bd09b73237237259bd6ed55de6c687217a7d6faf246dc8ea4b4ec52d07953491664012773ec1eec760a57f10fb3d01f45d11f14483715ce49835735c56afe970adcf90330dbcfb63df6c2fc5edecaa030ff65834526c905d0e461a025d69cff573f2e9ab94deb0af1cbb025fe978bec02542ce88ba88d52d133e79d3533553cba41cea25b138037452c7556b1922eaf08ce82f780105e84c7483035b73838ebc5e6f69f2357f7b0625428d8ac021fc15c052ba995160308d54a8b515d169f747e752cc7e18ce5d020650edd60f1d666004f33155707e55c44403992f01d777948ff759fb614bae1dd46d9acaf32e8c68372e980e0667e77c717a5199298f611c02af5d0e4710b5edc2432f117a0b2b7f6041c913eb2431eb1cb160b35e086d7676ea34caedf3af4d6ca901de904013ef6b5ae81d5020bf75098f0b305f703aa830601d919ffc72873e646f7f92d6956e37960bdad1bb7a02261e1ae98dc51d1fa6c3db0e92e8b2774b93d6763731254ec452a682df48c81882119e9c87ee9c76bd0f4b2e4fc422143f3493b24c99c7fa0550218eff712d00b7b480e1aa7b1b0d6eadf4ae8ab1d0c54f08d96cdbb8fa9ceb4f365b82d06d2983018ee03c71fff3927c088d199d1cc5eb82afd1c2a83f856abb3bf47d12db922af83c39616446f6583d575d020430609cd0fa90162d4b52355d46433113e6d73532d25449192c45a4e857f29b5cbf02bc86577b604fe90f98b147d031284907bc4974b75a16239ac6cf694c06efd1c54cab00a269ac3b984a3fcd546d05b3d847582e6da08e52ba9de5f9ade6772f08f5b3b6c0d9c3d4af5b73a1be1853cae92655ee51f4a08e4267fec8430e54153770fb6bf1a014e6978d06630f6c5bc30db600b0ee1b7bc28b9ed6d9d544ce0038be013299d989d2f988ae53deafaca8ba59a280fa52261a75b995933f3bead4fc7ce78a6ece548e1b03b6e2471b2b0edf0b690b36c69bbe7e8fc4eacb2a438f89e495516858fb42253650f4b315eeba2ff4555603171673e3a244d0ed3c80973e598053456c4c54c3ee87b55852ea50b4e3903c6e13a4d999b1af4f7bb2bc2a0c19c2cda286453eec986f81b952cbda03ab719c28e55797d062552f609e9e2a5f58aa1", 0x1000}], 0x3, &(0x7f0000002b80)=[@dstopts={{0x60, 0x29, 0x37, {0x0, 0x8, [], [@hao={0xc9, 0x10, @local}, @calipso={0x7, 0x30, {0x8, 0xa, 0x5, 0x1000, [0x101, 0x91ee, 0x10000, 0x401, 0xc7]}}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x5e, 0x4, [], [@hao={0xc9, 0x10, @rand_addr="367303f21e8d1beca0a0d8b6d71b1c15"}, @enc_lim={0x4, 0x1, 0x63}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x3ff}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7ff}}, @hopopts={{0x28, 0x29, 0x36, {0x32, 0x1, [], [@jumbo={0xc2, 0x4, 0x8001}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0x40, 0x29, 0x36, {0x1d, 0x4, [], [@enc_lim={0x4, 0x1, 0x93}, @pad1, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr="5853fdd924a72e1df4267ebea82d1264"}]}}}], 0x120}}, {{&(0x7f0000002cc0)={0xa, 0x4e20, 0x8, @rand_addr="73802e964981792acef007943d3d3d05", 0x5}, 0x1c, &(0x7f0000002d40)=[{&(0x7f0000002d00)="759c371d326301", 0x7}], 0x1, &(0x7f0000002d80)=[@hopopts={{0x70, 0x29, 0x36, {0x62, 0xa, [], [@ra={0x5, 0x2, 0x3d}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x6}, @calipso={0x7, 0x18, {0x5, 0x4, 0x3, 0x4, [0x200, 0x3]}}, @hao={0xc9, 0x10, @empty}, @pad1]}}}], 0x70}}, {{&(0x7f0000002e00)={0xa, 0x4e23, 0xfffffffe, @ipv4={[], [], @rand_addr=0x40}, 0x8001}, 0x1c, &(0x7f0000003080)=[{&(0x7f0000002e40)="f5cc4d0b026dac2bd10394a68989688b31127d60dd6a10cd17e70bae6bdfd7d199339058bdce97418663595d59d4f163e56b6e3e087d5258fef80e9f913e014daa1250d38cd7e8a1b45eeb38d86fb646857960b5a3d0d0b26c46f39fc40d4087ec91fed6e067689612d1a72f13b41ee31e0f2db484b23cfeabe3a777959ab0b9c88142b1a12de1", 0x87}, {&(0x7f0000002f00)="9eefabd88503ef13ff25c9be59269c8b754ca0ed7130fbb3355fe467d4930524e926d7a642a415b18f2bb08c903c3a3e59cc", 0x32}, {&(0x7f0000002f40)="33515dba9ca427f010bf566ab7f225d54028a009f861aec5e6a7545088f476c7b762d0aa899d59aea4fcd4cefa5561b4d98113eafb0e12331998", 0x3a}, {&(0x7f0000002f80)="5256841aa187c830c1b88babcc169850b0b03fa8b4b26c87c31c303a814b809accdb7f727514b773ea7e624d1a1e4a958ded2d73776475ede6196ebedf9a7012579c88da6497a4f29c2bb06b1ccd61ab32f07e02aa8a4c580801a4eda4625c6023618e43336a92347bfb4656836e45dce3d53776faef831c63fb530937eb887f4b2fca2e14d8a2282102a84ee1a19686df05dd50190cb2dd2d35450171f953d48a0fd8c1b5125171105ce1963515d09608f7f4c0db5a83e608617857d2bb673714c4fe95a1eed6375ace80b7bbf8e686df7d17db72771ed554d745857f15775dff0a1a1eb4a8cf9f42e327f0b497", 0xee}], 0x4, &(0x7f0000004800)=[@tclass={{0x14}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}, @rthdr={{0x28, 0x29, 0x39, {0x24, 0x2, 0x0, 0x7, 0x0, [@local]}}}, @hopopts_2292={{0x1070, 0x29, 0x36, {0x2, 0x20a, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x10}}, @generic={0x9, 0x1000, "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"}, @calipso={0x7, 0x28, {0x3, 0x8, 0x0, 0x1000, [0x7fffffff, 0xfffffffffffffff9, 0x4, 0x4]}}, @hao={0xc9, 0x10, @ipv4={[], [], @remote}}, @pad1]}}}, @dstopts={{0x28, 0x29, 0x37, {0x2c, 0x1, [], [@jumbo={0xc2, 0x4, 0x8}, @ra={0x5, 0x2, 0x7fff}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4a}}], 0x1108}}, {{&(0x7f00000041c0)={0xa, 0x4e23, 0x6, @loopback, 0x5}, 0x1c, &(0x7f0000004380)=[{&(0x7f0000004200)="ff00a2b743362ecd00fd5450a9c872d5e70bcfed2ec933cc", 0x18}, {&(0x7f0000004240)="d888bb249c85d0dd16658be480c54dd270d058d216f5696bd8904c19", 0x1c}, {&(0x7f0000004280)="cc378b62891f96c51ba8f261d7ea414f37c0c6f276c6b4531f7445cc87242a60b01457f6d05e6a042d4c20dc4dd01f600611a3365e4139eccc3e2a88c5afc902310451b633caba558d01d16d0626ccba3cc6ac1f71abfe61fdc6c831a8e9d17a17ecf87b2e09f5d995d5ffbedf43091b22f4dba68f7de355dd58eca9a576eec7895cd451d978425e276472b386a0b3ac8c4beae73b24612353bf663015bbf590cc6033b8df27686cc388037ef1f0b1ec538e2f50f65a680db0c579af68592dc0011975578b1ca9ba52406347b73cd59676a12cdc720122f11b576fa2385b2d56923634", 0xe3}], 0x3, &(0x7f00000043c0)=[@rthdrdstopts={{0xf8, 0x29, 0x37, {0xe8, 0x1b, [], [@hao={0xc9, 0x10, @empty}, @pad1, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x6, 0x78, "b388c81f966b018ab8706ec6a175c9ba4ae9630aeb9ab2256cc0c119999f5417ddd493fc17ac48750ebde0f46ae1b12b270188df9de72cc37cbd11ad1a43207c4f6898d18c1e5db428eba000d3d45bdc8fa1d02359f3cb382f516ede4a08659ce1a8b3ef88b2ab87d2d7cf98526de386233d41a1148b6527"}, @pad1, @jumbo={0xc2, 0x4, 0x7b9}, @generic={0xff, 0x35, "fea02def27ce5f9ab77fca6bd1199ea82c734388453adc62951c1a0ecb0196599fd192a9411a568b680ce3ab6ee157e06c9128820d"}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x213f}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x2b, 0x10, 0x3, 0xd0, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x25}, @ipv4={[], [], @local}, @local, @mcast1, @empty, @rand_addr="c3afd4b12d3552ca48f6d32037b57f0c", @ipv4={[], [], @broadcast}]}}}, @rthdr={{0x88, 0x29, 0x39, {0x2e, 0xe, 0x0, 0x3, 0x0, [@rand_addr="db29e91042696d50c38658bcb34db8a8", @rand_addr="8b13784e655d023d65afaace6fdd84cc", @loopback, @remote, @empty, @local, @empty]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}], 0x248}}], 0x6, 0x40000) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x446, 0x4) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) socket(0x0, 0x0, 0x0) [ 1766.673152] audit: type=1400 audit(1574202028.348:262932): avc: denied { map } for pid=10169 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1766.776031] audit: type=1400 audit(1574202028.358:262933): avc: denied { map } for pid=10169 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1766.915452] audit: type=1400 audit(1574202028.398:262934): avc: denied { map } for pid=10169 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:28 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x7f, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x7e0, 0x551, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x2, 0x1, 0xffffffffffffffff}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 1767.056408] audit: type=1400 audit(1574202028.428:262935): avc: denied { map } for pid=10169 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.106890] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1767.204310] audit: type=1400 audit(1574202028.448:262936): avc: denied { map } for pid=10175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.286294] audit: type=1400 audit(1574202028.458:262937): avc: denied { map } for pid=10175 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1767.390286] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1767.416291] audit: type=1400 audit(1574202028.498:262938): avc: denied { map } for pid=10175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:29 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'team_slave_0\x00', &(0x7f0000000340)=@ethtool_flash={0x33, 0x94, "e90a9cfbcceb731d529975224cec508440a4661c9a9b57ea5b8dc4d8db1d3ea9551d9c1b487d1c9a35bb7452cf967ec3ad62a844a13a6a9b395db8c3e81fd8dee7968d3f4f72becec969e8f64764232d48c414f3da0da91ba24275bb8c984ff343889d6c3e270c73c2cae1002cf1acbb4e56a0ab73ea4caf3a92480dd02b8f63"}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) quotactl(0x8, &(0x7f0000000480)='./file1/file0\x00', r5, &(0x7f00000004c0)="3623a504af0c795b23888ba80076939001755dc29ac093c81e09f1e2f5cae9512dbcbd2c6a525225f05b6f3498472cf8d6101878aa13dc88") sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x8c, r3, 0x88, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x40001) signalfd4(0xffffffffffffffff, &(0x7f0000000440)={0x7}, 0x8, 0x80400) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCSBRK(r7, 0x5427) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r8, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r8, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r8, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r8, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_persistent(0x16, 0x0, 0x0) [ 1767.520917] audit: type=1400 audit(1574202028.518:262939): avc: denied { map } for pid=10175 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:29 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000001c0)=0x3, 0x4) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) pread64(r2, &(0x7f0000000140), 0x0, 0x1000) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) mmap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x0, 0x110, r4, 0x95a0b000) add_key(0x0, 0x0, &(0x7f0000002040)='\t', 0x1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$NS_GET_OWNER_UID(r6, 0xb704, &(0x7f0000000180)) ioctl$PPPIOCSNPMODE(r5, 0x4008744b, &(0x7f0000000100)={0x8021}) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 22:20:29 executing program 4: memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$unix(0x1, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$unix(0x1, 0x2, 0x0) epoll_create(0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) dup3(r1, r2, 0x0) 22:20:30 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x109000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, 0x0, 0xe0d8ab951d1f4048) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setfsuid(0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r5, 0x5459, &(0x7f0000000340)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timerfd_settime(r7, 0x6fef8da7dfc195d6, &(0x7f0000000280)={{}, {r8, r9+10000000}}, &(0x7f00000002c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 1771.366479] kauditd_printk_skb: 391 callbacks suppressed [ 1771.366488] audit: type=1400 audit(1574202033.261:263331): avc: denied { map } for pid=10252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.394487] audit: type=1400 audit(1574202033.261:263332): avc: denied { map } for pid=10252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.417011] audit: type=1400 audit(1574202033.261:263333): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.441510] audit: type=1400 audit(1574202033.261:263334): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.468324] audit: type=1400 audit(1574202033.261:263335): avc: denied { map } for pid=10252 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.491418] audit: type=1400 audit(1574202033.261:263336): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.518673] audit: type=1400 audit(1574202033.261:263337): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.543777] audit: type=1400 audit(1574202033.261:263338): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.571677] audit: type=1400 audit(1574202033.261:263339): avc: denied { map } for pid=10252 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1771.596430] audit: type=1400 audit(1574202033.341:263340): avc: denied { map } for pid=10253 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.383541] kauditd_printk_skb: 992 callbacks suppressed [ 1776.383551] audit: type=1400 audit(1574202038.283:264333): avc: denied { map } for pid=10363 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.411389] audit: type=1400 audit(1574202038.283:264334): avc: denied { map } for pid=10363 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.436270] audit: type=1400 audit(1574202038.283:264335): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.460830] audit: type=1400 audit(1574202038.283:264336): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.488918] audit: type=1400 audit(1574202038.293:264337): avc: denied { map } for pid=10363 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.512479] audit: type=1400 audit(1574202038.303:264338): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.540362] audit: type=1400 audit(1574202038.303:264339): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.565740] audit: type=1400 audit(1574202038.303:264340): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.597063] audit: type=1400 audit(1574202038.313:264341): avc: denied { map } for pid=10363 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1776.621832] audit: type=1400 audit(1574202038.343:264342): avc: denied { map } for pid=10364 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.711456] kauditd_printk_skb: 872 callbacks suppressed [ 1781.711465] audit: type=1400 audit(1574202043.616:265215): avc: denied { map } for pid=10461 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.739305] audit: type=1400 audit(1574202043.616:265216): avc: denied { map } for pid=10461 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.763868] audit: type=1400 audit(1574202043.616:265217): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.788697] audit: type=1400 audit(1574202043.616:265218): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.814609] audit: type=1400 audit(1574202043.626:265219): avc: denied { map } for pid=10461 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.837534] audit: type=1400 audit(1574202043.636:265220): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.863739] audit: type=1400 audit(1574202043.636:265221): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.888864] audit: type=1400 audit(1574202043.636:265222): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1781.913543] audit: type=1400 audit(1574202043.646:265223): avc: denied { map } for pid=10461 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1782.110747] audit: type=1400 audit(1574202044.016:265224): avc: denied { map } for pid=10462 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae1", 0xcb, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:45 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r4}, 0x7c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r2, 0x0, 0x18, &(0x7f0000000000)='vboxnet1selinuxkeyring#\x00', r4}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) dup2(r6, r6) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r8 = dup2(r7, r7) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r8, 0x0) write(r8, 0x0, 0x0) 22:20:45 executing program 1: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x8ac62e63a9a6f052, &(0x7f0000000180), 0x3}, 0x0) clone(0x1ad25e5f5724f413, 0x0, 0x0, 0x0, &(0x7f0000000d00)="96b8d6af2cdc2cf64583e3668a295fcc492ea79f276c80eeff19abc7e348b183b5116e61a31dc90ace3b0e7bcb7b326e7eedd13beb08f7cf42e07e64ec695ecea8af5fe39f718986d9433eaa6e00101f7d2118c5f0f46c53744657f520ed1ec93921719da402ad471a43f38b0de90071") perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac80, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) syz_open_procfs(r0, &(0x7f00000001c0)='comm\x00') bind(0xffffffffffffffff, &(0x7f0000000340)=@xdp={0x2c, 0x2, 0x0, 0x27}, 0x80) r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x84b4de8ebfb42660, 0x0, 0x3b) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet(0x2, 0x803, 0xa0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000040)={0x2, 0xede1}) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3}}, 0x237) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/180, 0xb4}], 0x1, 0x10000000000000) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000240)='\x00') r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000280)=@ccm_128={{0x304}, "e2a2cbe6a2d225fe", "06e057cd2e18bc87f84642925472a40a", "6556cdfd", "610076bdfbdc212a"}, 0x28) socket$key(0xf, 0x3, 0x2) 22:20:45 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_udp(0x2, 0x2, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000100)=0x7, 0x4) bind$unix(r0, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') r2 = socket(0x200000000000011, 0x3, 0x1) fcntl$setstatus(r2, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000002c0)=0x596, 0x4) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000400)={0x23, {{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1e}, 0x80000000}}}, 0x88) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0x10, &(0x7f0000000100)=0x7, 0x4) bind$unix(r5, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r5, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$unix(0x1, 0x0, 0x0) bind$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r6, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r7 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000100)=0x7, 0x4) bind$unix(r7, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r8, &(0x7f0000000180)=ANY=[@ANYBLOB="00e69600fca9e69643cbe284b27c35833e4d618a344c8cc16a51"], 0x1a) fallocate(r8, 0x3, 0x0, 0x8020003) writev(r8, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) lseek(r8, 0x0, 0x3) r9 = dup(0xffffffffffffffff) r10 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r10, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x0, 0x0, 0x206}) getsockopt$SO_COOKIE(r10, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_MEDIA_GET(r10, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0xbd96b9f073d96152) sendmsg$TIPC_NL_LINK_RESET_STATS(r9, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="000028bd7000000000000a00000038000500080000240002000800030053ff0000080001000c0000e9070000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x8800) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10006804}, 0xc, &(0x7f0000000400)={&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="c24a28bd7000fddbdf2506000000100007000c00040001040000000000002000050008000100696200000c00020008000200000000000800010065746800280007000c0003004000000000000000080001000200000008000200070000000800010000000000240007000c000300090000000000000008000200ff0000000c000300ff0f0000000000002c00090008000200070000000800020004000000080002000000010008000200faffffff0800020006000000280006000400020008000100ff7f0000080001001f0000000400020008000100000000000400020010000600080001005d20000004000200"], 0x3}}, 0x4018000) sendmsg$TIPC_NL_MON_GET(r8, &(0x7f0000000600)={0xfffffffffffffffe, 0x0, &(0x7f00000005c0)={&(0x7f00000006c0)={0x1ac, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='bdw:syz0@'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xce43}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000000}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x380}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x522}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, '\x7f07\x17'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0xa779}}}}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x40081}, 0x4000021) connect$unix(r4, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r11 = socket$unix(0x1, 0x2, 0x0) bind$unix(r11, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r11, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r12 = socket$unix(0x1, 0x0, 0x0) bind$unix(r12, &(0x7f0000000200)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r12, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r13 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r13, 0x1, 0x10, &(0x7f0000000100)=0x7, 0x4) connect$packet(0xffffffffffffffff, 0x0, 0x0) 22:20:45 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000280)=[@timestamp, @timestamp, @window={0x3, 0x6000, 0x7}, @window={0x3, 0xe9e7, 0x718}, @timestamp, @window={0x3, 0x80, 0x5}, @mss={0x2, 0x5}, @sack_perm, @timestamp], 0x9) 22:20:45 executing program 2: sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xbe199e0d447a8e42, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="fe99f56245000000130000c61f7281c46fff5e00", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c4}}, 0x0) syz_read_part_table(0x0, 0x19b, &(0x7f0000000080)) 22:20:45 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc40, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000240)={0x10002000}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="880628bd7000fddb001473797a310000007100"/34], 0x28}, 0x1, 0x0, 0x0, 0x42810}, 0x62170928f16532cb) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) 22:20:45 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000500)=[0x10001, 0x6]) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:semanage_store_t:s0\x00', 0x26, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000006110100000140000950000df61452dfa5fa1211267b0e2bfe531b3c8abf83530dcd63b5fcad0a493c46705ff8c5ff73c338d689dec5d660a30867781cb5bc9e7dee2602eb915c21bf1b2bb919abb0f7ea7183fe03e03ddd33d46a1d4b065ef09a5287ec65dd784b0da8e361c9a96489648021635"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4000, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x170) r2 = socket$inet(0x2, 0x5, 0x81) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) sendmsg$sock(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="068d6e722f51b46f732523d502d2fcdbded67b3a1c84cb1609e3d7c3bfb7df929ffa7ec4648fb7d2d891bdf77e67e198b92fd6152b90928086f8e5dc02f2dcdedee1b37a2526c1af41245012a0e3a60a194a15456d10893ce78495d4e225f265654f1bc62fc2520c4c76d8987dc92c6eb9d3d18314c24eac4d41b187e3b8c235817382a6f14cbdd536bcaaed4b6245dc8abd9c3eba070d902d66c60eda7c8cae90", 0xa1}, {&(0x7f00000001c0)="86ab5fe7446f798e691be25fd8fcae7a67e3af62381ef87ab3cd2482e5d662d049afc6b94a0c6b7446bf2e2bd2f9dc34ec747eb7678cb2e6061385234bb8c9be6cb9be6a6786e7a23e77a0d6a960e44ba65d47a3cfcff6794a542e8451f3a209651c166e51cfd61df977be3ca1d8bfaf50307b0a7c81f15f14229771c28ee0b09fc90c2d0d24c4adc169370aac877a2081adf038147a4a68233f02cc206e4d34c91bb02d9b", 0xa5}, {&(0x7f0000000280)="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", 0xfc}, {&(0x7f0000000380)="2aeceb17458917e0ba4dbec641c622dca38f22465ec9cc9c72f7494d8e418a1b0e57622a2d0f784a49407b030636dca4036d3a689255b7adfde4ab6b6593dacd924f7b41ab6499d8c94ff151edb54da84aa7cee7b4817eaee05311f7f280b3bad5a75c192d434a9452f5e98d321701814dfd82609243e1a975f504fa7f378af330d5", 0x82}], 0x4, &(0x7f0000000480)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0x30}, 0x800) 22:20:46 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, 0x0) dup3(r3, r0, 0x0) 22:20:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935", 0xd9, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:46 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xc6, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2880000aaaaaaaaaabb86dd60b4091d0090f32000000000002d00000000000000000000ff0200000000000000000000000000018000907800090400600000000000000000000000000000000000ffffac1e000100000000000000000000ffffac14ffbb3a9700000000000004010901474ed2a712a06508e00178e3050f38afdc1321bbd8e3950f3e15303ab54eadbba491bbb117cbeb57d21fe32ed6f0b8bedce95c47fbd73f2e8ed6829618214315c188747913c9c367000000004300093168000000"], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) 22:20:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935", 0xd9, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:20:46 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)=0x2, 0x4) socket$inet6(0xa, 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket$inet6(0xa, 0x2000000000801, 0x0) r3 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) dup2(r4, r3) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xcd9a) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r6, &(0x7f00000003c0)={0x2000000040}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$inet(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r8, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r8, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r8, 0x1) fcntl$getownex(r8, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000180)=r9) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r7, &(0x7f0000000200)) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r10, &(0x7f00000001c0)) 22:20:47 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80, 0x0) add_key(0x0, 0x0, &(0x7f0000002040)='\t', 0x1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4200, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) 22:20:47 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) sendmsg$nl_xfrm(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x880000}, 0x14d, &(0x7f00000002c0)={&(0x7f00000001c0)=@polexpire={0x100, 0x1b, 0x200, 0x70bd26, 0x25dfdbfb, {{{@in=@loopback, @in=@multicast2, 0x4e22, 0x0, 0x4e21, 0xf801, 0xf74cb09f938890f6, 0x80, 0x80, 0x2c, r1, r5}, {0xd9, 0x5, 0x800, 0xfffffffffffffffe, 0x8, 0x0, 0x4}, {0xfffffffffffffffe, 0x9, 0x94f, 0x3e}, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1}}, [@etimer_thresh={0x8, 0xc, 0x8001}, @policy_type={0xc}, @user_kmaddress={0x2c, 0x13, {@in=@broadcast, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x0, 0xa}}]}, 0x100}, 0x1, 0x0, 0x0, 0x880}, 0x800) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000100), 0x4) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a71862f0146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6772706a71613d2c80ee63cc"]) 22:20:48 executing program 2: link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, 0x0, 0x8000) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x1f}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "52c947", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 22:20:48 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@fat=@showexec='showexec'}]}) [ 1786.809821] kauditd_printk_skb: 419 callbacks suppressed [ 1786.809830] audit: type=1400 audit(1574202048.718:265644): avc: denied { create } for pid=10574 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1786.992500] audit: type=1400 audit(1574202048.718:265645): avc: denied { write } for pid=10574 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:20:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x200, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x8, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x5, 0x81, 0x17}, &(0x7f0000000100)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x9}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r4, 0x4) sendfile(r0, r1, 0x0, 0x10000) lstat(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) [ 1787.185238] audit: type=1400 audit(1574202048.858:265646): avc: denied { map } for pid=10567 comm="syz-executor.5" path="/root/syzkaller-testdir909617109/syzkaller.ziSLRz/277/bus" dev="sda1" ino=16710 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 22:20:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r4, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r4, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1001000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4040804) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x2e9, 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xe000000000000003, r0, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000040)={0x4, 0x7, &(0x7f0000000000)="7a16bb259a55bd"}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_ALM_SET(r5, 0x40247007, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r6 = socket$inet(0x2, 0x2, 0x80) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000000080)) [ 1787.302274] FAT-fs (loop3): bogus number of reserved sectors [ 1787.328585] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1787.385263] audit: type=1400 audit(1574202048.938:265647): avc: denied { map } for pid=10578 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.558341] audit: type=1400 audit(1574202048.958:265648): avc: denied { map } for pid=10578 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1787.596107] FAT-fs (loop3): bogus number of reserved sectors 22:20:49 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = open(&(0x7f0000000300)='./file0\x00', 0x12a5cf0ca7539996, 0x14) getpeername$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000380)=0x1c) listen(r0, 0xffeffffefffffffb) syz_emit_ethernet(0x96, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd69d8652b002ebb00fe8000000000000000002b002f0000aa0000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="8002000090780000220c4e6358027cf8d94b65821312222d380000d027bfae242a68622c51251312e9fab7ae6d36bb8359a77225f1ea46d10008942d0771fcc5fe07f989bfb41d000a4a34a5d070000797aebf00"], 0x0) [ 1787.666105] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1787.760681] audit: type=1400 audit(1574202048.988:265649): avc: denied { map } for pid=10580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) open(0x0, 0x10400, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000100)='./bus\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00') sendfile(r2, r3, 0x0, 0x8001) close(r1) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x6000) openat(r2, &(0x7f00000003c0)='./bus\x00', 0x501800, 0x91) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x8) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {0x0}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc0, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xb23cdd0c5b4668ec}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x80}, 0x41080) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x4000000) sendmsg(r0, &(0x7f0000000040)={0x0, 0xffffffffffffffd1, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x396}], 0x3bb}, 0x0) [ 1787.961019] audit: type=1400 audit(1574202048.988:265650): avc: denied { map } for pid=10578 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.160244] audit: type=1400 audit(1574202048.998:265651): avc: denied { map } for pid=10580 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.296025] audit: type=1400 audit(1574202048.998:265652): avc: denied { map } for pid=10578 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1788.452376] audit: type=1400 audit(1574202049.018:265653): avc: denied { map } for pid=10580 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:20:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r1, 0xfffffffffffffffb) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4200, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) fcntl$getflags(r2, 0x6bb667719f02f55c) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) 22:20:50 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xfa) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000100)={0x0, 0x72, "791f2504cd2c2433cab2058e68aba1d0a7d20e3855c3f6969c4e1d2e73b1d5dcf5b2cb1d108bd801c5ac6c559df1d417ffdcd8b15de164ae1153e85835db69dba61efcfb0de14cd39b2e5ca96b98cd3b582c5d8e5b44bd45f5c052e84d4130e5d2e3db6a7a27199319e092d38451cc47e5be"}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket(0x0, 0x800000003, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1791.843669] kauditd_printk_skb: 234 callbacks suppressed [ 1791.843679] audit: type=1400 audit(1574202053.741:265888): avc: denied { map } for pid=10639 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1791.923980] audit: type=1400 audit(1574202053.801:265889): avc: denied { map } for pid=10639 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1791.994181] audit: type=1400 audit(1574202053.801:265890): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.074219] audit: type=1400 audit(1574202053.801:265891): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.153868] audit: type=1400 audit(1574202053.831:265892): avc: denied { map } for pid=10639 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.234015] audit: type=1400 audit(1574202053.851:265893): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.323781] audit: type=1400 audit(1574202053.851:265894): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.403930] audit: type=1400 audit(1574202053.881:265895): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.493828] audit: type=1400 audit(1574202053.881:265896): avc: denied { map } for pid=10639 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1792.554726] audit: type=1400 audit(1574202053.901:265897): avc: denied { map } for pid=10640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.852615] kauditd_printk_skb: 779 callbacks suppressed [ 1796.852625] audit: type=1400 audit(1574202058.763:266677): avc: denied { map } for pid=10726 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.880452] audit: type=1400 audit(1574202058.763:266678): avc: denied { map } for pid=10726 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.902872] audit: type=1400 audit(1574202058.763:266679): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.927394] audit: type=1400 audit(1574202058.763:266680): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.954190] audit: type=1400 audit(1574202058.773:266681): avc: denied { map } for pid=10726 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1796.977227] audit: type=1400 audit(1574202058.783:266682): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.004529] audit: type=1400 audit(1574202058.783:266683): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.029492] audit: type=1400 audit(1574202058.783:266684): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.056588] audit: type=1400 audit(1574202058.783:266685): avc: denied { map } for pid=10726 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1797.083741] audit: type=1400 audit(1574202058.833:266686): avc: denied { map } for pid=10727 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.861041] kauditd_printk_skb: 1002 callbacks suppressed [ 1801.861050] audit: type=1400 audit(1574202063.776:267689): avc: denied { map } for pid=10838 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.891640] audit: type=1400 audit(1574202063.776:267690): avc: denied { map } for pid=10838 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.920796] audit: type=1400 audit(1574202063.776:267691): avc: denied { map } for pid=10838 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.945510] audit: type=1400 audit(1574202063.786:267692): avc: denied { map } for pid=10838 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.973948] audit: type=1400 audit(1574202063.816:267693): avc: denied { map } for pid=10839 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1801.997580] audit: type=1400 audit(1574202063.826:267694): avc: denied { map } for pid=10839 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.024842] audit: type=1400 audit(1574202063.826:267695): avc: denied { map } for pid=10839 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.049621] audit: type=1400 audit(1574202063.826:267696): avc: denied { map } for pid=10839 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.077805] audit: type=1400 audit(1574202063.836:267697): avc: denied { map } for pid=10839 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1802.101350] audit: type=1400 audit(1574202063.836:267698): avc: denied { map } for pid=10839 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935", 0xd9, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:07 executing program 5: clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x7) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xffffffffffbffff8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) dup2(r2, r3) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x16) 22:21:07 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB='#! ./file0 @Gsecurity.evm\x00\n\x00\x00\x00'], 0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(r1, 0x0, 0x0) getpeername(r1, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f00000000c0)=0x80) inotify_init1(0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2, 0x14, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) accept4$unix(r2, &(0x7f00000003c0)=@abs, &(0x7f0000000140)=0x6e, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x100000000) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) 22:21:07 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$peek(0x3, r1, &(0x7f0000000000)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r4, 0x0) pipe(0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) write$binfmt_elf64(r5, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000340)=""/187, 0xbb) ioprio_get$uid(0x0, 0x0) socket$inet(0x10, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000000) ftruncate(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x20, 0x70bd2d}, 0x14}}, 0x0) recvfrom(r6, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000006c0)=ANY=[@ANYBLOB="e00000027f004ba80000000009000000ac1e7bf5707c50910201ac26ea15ac14140dac1414aaffff000000003d5e52bbe622e35a5322df851b949ac06cb51b67ff072cd8d66a6afbae78ceec18e8b105ed1ab59308268a8903384e9099ef2a812adb24ab7e41c4ca749f54cf5bbaa737f62543b5a3616919a8aaf2ee23926feba29ae54182f24975d42e9c35fab91e7b85f487d92b9f70b1eef71f5154eb087e48da3f65c9b18f0e2728c7a053abed9031b02364f1cd4ed53ed92f9036000000000000000000000000f8ec5ffd299c405c330006e41ff2294a9d65f783eeff3c73db60ef0a6691f3402a4c8d9012dc98e5aea670c5f8feb246a12636cc6d2fce34fee8f43e88924305d532266f13c02f882d73e04dace303b54563e7cc012c08fedf37106f63f3ea06c8d80267a5937779c79d136d7326a099a3ce6d75a5817b66ca7c6f"], 0x1) socket$inet(0x2, 0x2, 0x0) 22:21:07 executing program 2: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000480), 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) getsockname(r1, &(0x7f00000001c0)=@rc, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x100000000000a, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d00", 0x1e}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000400)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000002c0)='mber\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x8) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1fcbbbd02f66696c65300a"], 0xb) close(r4) readv(r4, &(0x7f0000000380)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000000300)=""/95, 0x5f}, {&(0x7f0000000080)=""/56, 0x38}, {&(0x7f0000000240)=""/44, 0x2c}], 0x4) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x6, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8923, &(0x7f0000000200)={'ip_vti0\x00'}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) 22:21:07 executing program 4: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000140)=0x0) r6 = fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x11c, r3, 0x1, 0x70bd25, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r5}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r6}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x2}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r11, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 22:21:07 executing program 5: memfd_create(&(0x7f00000000c0)='\x00', 0x1) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000240)={0x2000000000000380, &(0x7f0000000040)}, 0x10) 22:21:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c2", 0xe0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x2, 0x0, &(0x7f0000000040)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff) sync_file_range(r3, 0x8e2, 0x1, 0x7) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xfffc) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r4, &(0x7f0000000d00), 0x400004e, 0x0) sendmsg$inet6(r4, &(0x7f0000000400)={&(0x7f0000000240)={0xa, 0x4e23, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000002c0)="ba5303f2fe4908548eaf3aba46b2d0e888afbbb9dc06c1cf458bcbbad62f458d1bbc06392a24002dc976f74f09726a8694ccf65199a880a1dde4aa9b0bc8a8b6025a407048870401d173269906222672533279228c4fd8309044f0e3b8c078ae6ab1216bb9da656fad594f4c846bc7c23f8dd95577b790f1b0b6c6a0c02fae3a8d3e98e77ecec81264481665f31dd3ef0b5b8766263a42e8feb3f0fd63088945dd070a86e89a643e789630ccdb07faf6bad3d8130e9927fbcc1c83f8228ea1e5c0a6e5de2b72", 0xc6}], 0x1, &(0x7f0000001800)=[@dstopts={{0xc8, 0x29, 0x37, {0x2e, 0x15, [], [@ra={0x5, 0x2, 0x6}, @ra={0x5, 0x2, 0x7ff}, @generic={0x3, 0x41, "3d20cc7cc5d0e350e171aa2bc014a2e0c1e22b15e6d2b46149cb49d82c02ece57ad114c69e627c5436c3a96d9419adc754b04ac1d49941d1447b3ab7c10ae9aeb9"}, @generic={0x2, 0x5c, "8ae09951d3870853c24fb449f1105f74be5ea0266c9ef0290738d9a16bf13793fbd43d872e4d6995df5f77876e49beb87ce842a38a32cbebc20cf3ac60484d9148a468fcd6ba86a0a9e2c896602ad39dece85eb52826c9648d07544b"}, @ra={0x5, 0x2, 0x8}]}}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0xc, 0x5, [], [@jumbo={0xc2, 0x4, 0x80000001}, @calipso={0x7, 0x20, {0x9, 0x6, 0x20, 0x2, [0x8, 0x10000, 0x2]}}]}}}, @hopopts_2292={{0x178, 0x29, 0x36, {0x88, 0x2b, [], [@enc_lim={0x4, 0x1, 0x2}, @generic={0x3}, @enc_lim={0x4, 0x1, 0x90}, @generic={0x80, 0xdc, "8a7e6d1cde34f054c0d80d11fbaf0bc69739c18fe188193c8c7f99eb844791e3c0032b1b1b4e1c030cc09460828cce6f5198392150fa36cdbf46609ecff208828d3b31da46ce6a700af5eb05fe155b4dad861eb3ac9dbb7caf4c42374a3015bbf58886cef894712b311b0e9a99d3a4fd724234a6e6ed4e3e639c5b31225498c2097a044182505c942867cb161d8478ff2eb82b2b39ed84c7c8cdc3f1eb14076877e9f61893c0c0cbcde2f55fd72222a65e52e54af41c1bfe3688f62838ec3188c3a707f0f77d0b8e9305241e272d534be4ffe8c25d4741444b21358b"}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0x568}, @generic={0x8, 0x62, "23b9516d081d5bc5b3a43c3cb917a3948c9ef99fe66d54b2c772a3af2bbae1876fa6ebf95e6d7878669a168e02c00bc5ecad6fce207e9f96eb0f02d6f1bd1281b4136ceabafae5eef3622a9c33bc607d0585f0fdf37ef9c836d9613ff03c011dd65c"}, @ra={0x5, 0x2, 0x3f}]}}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x3a, 0xe, 0x2, 0x0, 0x0, [@ipv4={[], [], @remote}, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @loopback, @mcast1, @mcast2]}}}], 0x308}, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000100)="8d5271fb30c5822ce294d0e8051e0682663409a713a978acd3e4c86f8de718df646fbcce3135655b0da5fe4a63d21e486762f57ba69bb8d500c67914277c71e8d811ddcff98189638360b838d8afb298c4c178a62d3473a3ecd107b2736870b0130564c8710c165ba577cdbad633f58c8a97a0fdb346f63d87564b28c7e25f3a0fd0c6c4d83f1e02cdbd7e75dae9727937395f88ea989e4eab43f9d91dffd885766c76293f92adbd8c1630756f97dcbe178b28f15e1bc8ac41a73fb8132e3b07c981905d65f1816766962c159992a2bab14ad46e25d2851fbf78cedf58c76ddfc57679def6293acb3cd5", 0xea}], 0x2) 22:21:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c2", 0xe0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f00000001c0)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000380)=@v3={0x3000000, [{0x3, 0xffffff16}, {0x40, 0x3f}], r0}, 0x18, 0x1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f00000015c0)={0x8, "e52aac313baccb9b551156a2d7c12b7711c32a17d3c4c9ceef08c2046fe288a7036e513019e5e114cc4ae935d23a9990952824f5d0c1f52e2eb94e5301ba9dc9a02818038eaef46fc2c3ebbe46e4a6024c93823f66462ba3d68913fdeadd1087b06846aa3ddf6ed3dc2b61b4960f48c2edf5cdf23c7e8d3f2e6daa71e66b29bc19e377d7df4637d735194a52da503a0ac44383ba5b3da867e09ceae02a9bfc21e7f28814c2fab7da41344e207ca706dc37592abdb685e4b80eb6dc2b1dc550a1d16166d163a4a220a54d7844facbbb2648ee90aa05c3c0d0bf69e86a5f48d571b9337590d05e9947727c0d77d18a117f110252735ca6700a55fd26838935808cce7b7c222a75339e44230bdeb99bc39c0c1cc20de74fcb9744f4c4a988f3874a846d31abcf5504d78a3e14f35f6cbd123fcff22890cc17c730c3ea9f74616dfe60064552ec25568a6211bdc39483a28bed0df0afc7d7c6d1800000000c8846ea512a8ccae7a99da8dd3009feaf204d22e32c5ecc333e616159d55328d375e59194c5c9a0b3843afb283d1d26f59e03105e91aa552386468432a09be73220e942394f34c559797b74bfe7c5c2c639a40e4d2e81e1004b127540a0bdd6be3e95698e75e4f1203a47d61f506ac9364be9d98ae46536f74afe08c450ecb902e00f188c9f32aed0677455e10bbe82c763a464f10f64c403c35376b7a675546835209f0e2809e9c2bd191f784dda4b727bfac512497a07474e6d3e13234801df81abcdb6fbfb152483ec61baaee45a5d733c62107f63c55a046401a5ddef70cef8d52cb4784e3efc34de554c8ff48f7ae3d6dc1ed4eb70fe1e610355fd66ce1af81fb3dadfab8a9b0b1f26ca11f7287258ad4766e08340f8f2fd53e7e5f287bb73c186f0290f225687040c762776a02e5e65f1b9b713e8ef98ffe111b3e4e7b781dd3ed763ed8dafd67625fb300ac752c0ff9c0c04b75be292c3f0247bd0b3560f1c76aff38791037fcf2b812f1601934a8fc769f7198e0df685841489263a1495a8a8bab1a63cb12b302a6f0dbc4df2d0e8df4c6bcd47beefc179d85b70b42b319453e6efaff96a509420bec299f227c4b676c58038916897f15430ff52087dd97dd329c6b6e207378053accaa31843a333e4f69586103424f44bd67eb355c1fbe078e62f07ebaae46c3e335372127dc5fa70a4579af715e531bda52761dc206aded4678079720603a577ef7e5fb5a81a525b7c96a4047d9d6bb80d7e0ce55cc0a4f73256ae9c515307f13fe54126786de425d7a674b05116104176faac5b9365b33fd2f5a710a5159d342abecede83ad421bbb712cd5b006671a958cec907311719eb3e0b5dc4fb51054e06656a7a2a066c0aac65ceb434ca3f242cb2b1d7a22179a85cbbeeacc2f0135d8dd4d1363a98d2543fa4973e19eb359e956d27f142c75f62c7aecaf47090236b9791847725bc6fde15cd4a119a4976a3f0f2d622973ad9000aae56f88b396fa1881ec0b0a5de9955fc8f864b36eacd635b88826e0a64897d607fa4a14f7786b037cf308bef61c7f860e38f1ae67fe8cb7802dbe85f9c0c082eed1a13e645370d0c95d63bba215ac8a637b8f968aef06329d62ba131b56b46bfcfa6a5e82016d5eeb6e7db45595d1acaaa5ec9886315d3dced9d0a15c44c043ac91e4ae7077139774607b76cbc017f636145beb84c1829a6030f4a895a56b8d141f743c9189a71387993f785804f85927a23ccd79c432ab686b621ec91706ef082b4ea4fa608ce2daca0d2e2e07ff51e6a8fdc22f0c8ee5ae53720f93b4547704fae580e5560e3c7b1ac2a38ffc294d3c96635e3b919339394843c8a171c7d12ceb9c0a11be25783694b177b399e7a495538e293a59d3ab44b176afed6894aa0e501d9b98981be3f2057bf6c9869403a34cb83ad57150c674301f39524a026f3608a3414287bc4e507355823c6f8640bb803a392fb8847023d1db3c39753e72414682c617de9bd0d5b6a55d46004d49f20d2f8f53cdd8eb11402f7895cd7c01b4964fd005c564b0b0e156969ccde818dda3a7cae02d1d3af95081e6549f28976fa81b5e90fbb0a62fea850ffaf0220132189c11a74996261f6de6001c50364f08c4f48f01000080ec8ee4d003efeead64b87d64b43cd6868f365e72e26dd9f5f9f74d135f64464cb38dd62051ae70c58fdaabebe700eb9b290b8ed4142db0090219e6186f8f71fa8fe1ebe42f621b8eed182ee8ad0401f0a3530fd48e4d1eb2637f1fbd2a7032b0f85715203c12ab8ff48131bc4ff28272b57119a76bc0b30fef5294c23c0b2bcadfbba37a00502b5e43d72148d9acc7cb7cb39dc830cd6f30262a09eecf29d1055c2edc3926cfd5076a25f9f172ed145359fc974ca5ded652433d212607bed155df1aff269414548a39a644b6ce927de5de6e6750575c4fd7ea7fe10b1e51fde6975c0c23fc012a8b12fe3fa64e972e4e09eafea165ae5c1ffc9d761e1314a781959c223b96eefde0f4f45c7ac032a8d3f1bd304114c3329a3e4966eddcc8d44ae70bad2932f963100955e2d2d487347c2aa8356bc6bc3c84e418163c758f1372246884e6d80d87d7ab3fe660dda13ada65f200b4fb365223b93bbc29493ae6dbbbb1823edb8e9f045b60414edab955e1046b67a8d4908ab08ad90216125d2ffd8c8614a9a4940df0a653b1cf53cf456412228445ebc8e1584adfe13207ff24fe602e2a506218710483b5544347a3d515b7d2ddcaa1bb7ae3578841910600000059d5f260d23ae17a9ffc77f79758844586fe53517097838a92dde8873e8be1cd5934b1a4bfdd990b5725b811c4a2c121b7729946993a736bd195c55684ea680304af4844a1b2f74e2c2b2ccaeceb00b9c2c515b70912efb27643c5624025e358b44853cc0efddc103ee514471af902cd9b68f102c95a91d2b825b473ce842e6367b0b7305ce8be6f9c812abe860bb632e00b69a0370e5c8f9ba0cebbcbe1b9276949c303a4e9e3b6db37a0716520c07512192364abb58399fca973a1b32106096eda8bb85745562e8a35c5e917fdf858091a4c29d6549e10098d6b205fc5cad546fe07b3a70756cf7079c88f3708f0c8527002b99e80cbd584a3737fb37953cd6dccf21add4d4b6e65894490840c008578737d5e208649d1cd34beb403c2226300297853a29cf6c661b426c13306575d81f6fd21712e0ec4366013883b95a71d5094acbf156e42de11cb873744983ec1ff9cfbee2278053b8b4e523388bd41dfd3c2ecaacc5d9d2958bbfa94f4bd0ac1c61c98ab295dd5c69020f1329818df9a2aa88ced03f4e6a4d1f8cb020afcd2384e65511ddeb908ba0c13a03dd32e8d4ccf0246008f35ef5184f81b8fed73b4aae4998bd8c7d784210042247d39396ba881bf43555d0ec58deede7b4729e79d31b2a346527594ca3a47a1723a792a701dc18d0124365e2c4a4fefed48c29a9f2fc747b302eaf92a100b2da211c91de4ab79d4aede483d852635c6f14d3803005739d475c7aa67fdd54767a056eeb3098dfd8d1c21f32e76f024a2a622f5641b83f540a643e72dc15804b78bac475f39e23291798aa45a2c10aa5fef2d5e4d7b8f529a66535d11c6149e9797f2fcce2804f2a5370345e98b0c02c7dd27135d414fe72f0740423920d68b64f6b8c05788c6693ee1b9abb5d4593a970dc3ee2528765fb739964f4fed7200d7e796a9f3d0d60834e63cdd8c29d4e85011e4ba4f00000000954a5b5bb5d1cc69f2376599d5a3e8c30714893f763c06061072c10cb0eee17eb2a2514acc584b04e169d4a33a330367bb725ff9462f5d50282a2e393293eec8ea1eaab8217cc108798a4a57eccdb00647ab9f07318993f7c59c395a93cbd681d0a967a56e3f13c832c48dcc0d0096871b0d51b754e70b12a849b6f376923f7f7d909f64d64e1d6e338d39166b725265b96ed21e36b12057148d66e5df04b7b734e80957d47fde172be2473b9ac6fdb823abe3e11ec69a170a14511d5572d6c0d9f6b749acad7003f0567bb6f9381649e42d02764077330d5af3d93185968a9f8dfed16c4a7c768a2bb98304946a557182c0ce93e82b340074e384cc6bd6129483386c654a6ab3bb12fa8e86adafa93f218fdf5019c09292858acd8ef7aa6a78e3f846215856d630ae9c5fc4009693b2767ea55c469f9099693287b35d43ee0f7a5baf3328d37b2c536f2abd6e21e472c105ae982cdd26a5a20562122e71efb1486c28d9409c3114b608f297695958c5604cf0918c0c70c56c79170260d73bde297e47cae1c404cca0a96eed51a2dc8fce6ad862fe767ee5b5e68f231096825d935b809b3c1b5d9a2cd76cae22652bed7d263b42612ed717eba0aaf2a3989c4520c402d29428010000000000000062fb3fdd073b91d4e2f6895fba9639ee78bd8ccb5bc3ce442fbeb9a1521314b82804293159fd7df4db66b78a06fe93e705bbc4e0d294a787c3cbf271b2acd15e7b4998c822f77294dfb08063c9ff26a424884b46e26b5560d756c114ad1a7b92eee3f49dc2883b604ecc49c5ce92ce467778301326588a6577d44758e8d90710248d110dbf3d3d568779bd1c616369f84619dd089e38b5b6821986d2ac9f1547a342877815a3864ad70b68b196bde9d810512f411d5235633ef65088788dfa3f152df7cee3a0803f6ac7ae192301dec07ff870ff3d7cf1c09cc9093263b225d01222376531007af9e6fb96e5ccaa8274f77b56b9a03bfce15a1aacd78c4adf8bdf41de8aaf421684c27526088c54322b5eead7b43d1f3960dd283218cc6f5df233892d7d5b0b0649ffc5a1c4909f2967a8c1f15b419ecde0448f071fa71e553f4f12cfa5e35022e75ddc5509edddc3de82d9097759b27f7c24776702e0ff64559281f796f11c1a9c77a156f390d2d18d1759b6be0347eb5bb4df912e9cfafa0db3be3243bacb378ca0946cece695a8099d6d7a24fc8bcca4c09695e3208f17f00bf404f6eb7852dfe73c163a19fd4e890e0edd5c7a727984b6f47a952373b95200bba061756c699c218b52c265b22bcd5cb24fdf056621fdd2126cede171e435320ca34e56e4c82a2afc9a59d3bf4647877658b6f23a6484f37acd8e2e184926993b5d1bbe6cdba64f486b4fb41bb94a644140540894f8fc14e585bc8beae88eabf926add289c82eb8cea99743baed842d76eb5c5573f7a7f3f2693960d6bfed697b5619afd942f41689dbd281a35e32478ba3a388dada82a2f4164481aa6a8f3946a84ea6186b20ce388c202be42996ae90feec7258d4a4a276353df84c96b160ac003d81cf395c0e61b0f0a9e692c32fab307f754cae5de7716a00cb96160cd39c931f4885d612862cecf6ba76502c9d266f97e4cf6cf0a16f787788e5471458a0dc24d3f2a28caa0f7ee00cf8bb113bd9c2b086037d765b5ec9a849df6f482fc01b48261e44299b0bc88321d837b6e2d221ebf2996b4140cd82e531de27f8de445f31c64469a5a145b031cd2569d19e27369c31ec63a989f0c9aaba7cc9d36d652001d40004f83a90d6465854f31bf15d1ef6bff4c02d60b948a37e3f50d250d7f8c83b80c67014aae5a35908283168c034f654acbb9d0fc261671d612e3d74261653e69e5e9cf7c8fda298b4d6c879cbbb97eafe648ba70150599089d65c1fdc0d5af879a2d46a443ac6dd21b33f72510742db4faf7eeb1580580ffe26e2d5ff00", 0x1000}, 0x1006) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) 22:21:08 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) syncfs(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$uinput_user_dev(r4, &(0x7f0000000300)={'syz0\x00', {0xfff9, 0x100, 0x1000, 0x200}, 0x3, [0x200, 0x1ff, 0x6, 0x3, 0x80, 0x9, 0x101, 0x6, 0x361b, 0x37, 0x9538, 0x40000000, 0x2b00, 0x100, 0x8, 0x800, 0x7, 0x7f, 0x1, 0x8, 0x80, 0xfff, 0x4, 0x5, 0x6, 0x7f, 0xee6, 0x5, 0x4, 0x64, 0x3, 0x1, 0x9000, 0x3ff, 0x4, 0x2, 0xeda9, 0xfffffffb, 0x1, 0xc1, 0x9, 0x51, 0x3b, 0x4, 0x20, 0x7, 0x7fff, 0x8, 0x3, 0x9, 0xe67, 0x7fffffff, 0x0, 0x7, 0x400, 0x4, 0x1, 0x0, 0x1a, 0x4, 0xb8, 0x9e5, 0x6, 0x7], [0x6, 0x1, 0x9, 0xff, 0x8, 0x4, 0x7, 0x11, 0x0, 0x1, 0x6, 0x1ff, 0x0, 0xe1, 0x4, 0xffff, 0x6, 0x9, 0xfffffff7, 0xfffffff7, 0xfff, 0x7, 0x3, 0x7fffffff, 0x4, 0x3, 0x8, 0x200, 0x1, 0x8, 0x0, 0xd89, 0x80, 0xfff, 0x5, 0xa495, 0x1, 0x3e7, 0x5e9, 0x400, 0x7, 0x800, 0x7ff, 0x1, 0x2, 0x3, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3545, 0x5, 0xe27, 0x8001, 0x6, 0x8000, 0xff, 0x8, 0x1f, 0x2, 0x1, 0x7fffffff], [0x5, 0x69, 0x1ff, 0x3, 0x6c1, 0x0, 0x58, 0x2ca, 0x2, 0x4, 0x9, 0x4, 0x5947, 0xfcc, 0x8, 0x5, 0xa3dd, 0xd32, 0x4, 0x6, 0x1ff, 0xba73, 0x80, 0x50a, 0xffff, 0x91be, 0x9, 0x20000, 0x8a84, 0x18, 0x3, 0x1, 0x100, 0xffffffff, 0x0, 0x4, 0x9, 0x4, 0x7f, 0x8000, 0x8000, 0x4, 0x8, 0x8, 0xfffffffe, 0xb7, 0x9, 0x200, 0x9, 0x0, 0x3, 0x800, 0x5, 0x5, 0x0, 0x7, 0x9, 0x7fffffff, 0xd7, 0xff, 0x200000, 0x9, 0x8, 0x6], [0x9, 0x54, 0x9, 0x1, 0x10000, 0x7ff, 0xffffff2a, 0x7, 0x5, 0x8000, 0x5, 0x200, 0x1, 0x0, 0x1, 0x3f3, 0x0, 0x81, 0x4, 0x4, 0x2, 0xcda, 0x2, 0x401, 0x71, 0x3f, 0x800, 0x4, 0xb54e, 0x7f68, 0x200, 0x7, 0x7, 0x7ff, 0xfcea, 0x8000000, 0xa14, 0x1, 0x3f, 0x7, 0x3d03, 0x80, 0xfff, 0xffffae18, 0xffff8001, 0xffffff80, 0x5, 0xd343, 0x552, 0xcbfb, 0x9, 0x6, 0x8000, 0x20, 0xd35, 0x1000, 0x3aa, 0x3, 0x0, 0x80, 0x3, 0x6, 0x3, 0x2]}, 0x45c) ftruncate(r2, 0x200006) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 1806.868282] kauditd_printk_skb: 535 callbacks suppressed [ 1806.868299] audit: type=1400 audit(1574202068.788:268234): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/dev\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000001c0)={'lo\x00', 0x200}) accept$inet6(r1, 0x0, &(0x7f0000000180)) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x1000000000001e, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000000c0)) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000340)={{0x1, 0xfffb, 0x3, 0x8}, 'syz0\x00', 0x8}) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(r6, &(0x7f0000009d40)={0x0, 0x125, 0x0, 0x1, 0x0, 0x0, 0x8cb17a491c487472}, 0x0) [ 1807.050663] audit: type=1400 audit(1574202068.788:268235): avc: denied { map } for pid=10933 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.177220] audit: type=1400 audit(1574202068.818:268236): avc: denied { map } for pid=10931 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.365091] audit: type=1400 audit(1574202068.838:268237): avc: denied { map } for pid=10939 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3ff, 0x5cdebe99, 0x100, 0x4, 0x1, 0x4, [], 0x0, r3, 0x5}, 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x64) r6 = open(&(0x7f0000000080)='./file0\x00', 0x252262, 0x20) write$P9_RCLUNK(r6, &(0x7f0000000140)={0x7, 0x79, 0x1}, 0x7) [ 1807.606476] audit: type=1400 audit(1574202068.858:268238): avc: denied { map } for pid=10939 comm="true" path="/bin/true" dev="sda1" ino=1443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.787415] audit: type=1400 audit(1574202068.898:268239): avc: denied { map } for pid=10939 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1807.955982] audit: type=1400 audit(1574202068.918:268240): avc: denied { map } for pid=10939 comm="true" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.116243] audit: type=1400 audit(1574202068.998:268241): avc: denied { map } for pid=10939 comm="true" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x1, 0x0, 0xfc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xffbffffd, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x20010, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = dup3(0xffffffffffffffff, r0, 0x180000) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000ba7b678066950000", @ANYRES16=0x0, @ANYBLOB="020027bd7000000000000300000014000900fe80000000000000000000000000002b08000a004e220000"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) r7 = gettid() r8 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r8, &(0x7f00000005c0)=ANY=[@ANYBLOB='#! \t'], 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7d6a93b0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') [ 1808.199414] audit: type=1400 audit(1574202069.028:268242): avc: denied { map } for pid=10942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1808.328190] audit: type=1400 audit(1574202069.028:268243): avc: denied { map } for pid=10942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x3, 0xa, &(0x7f0000002840)=[{&(0x7f0000000180)="161287cfc3051c60decd59e60327e1512e8fbf6f0d23a99f063c8588a0a72a5bbcdb44298a2545ef6a302c7d0ce9d31cc4b87731184ba78da128d1cb3cce03659cb2a1634ffdb6b79fba09419afd45768fcb1651f24c490a063400503f3854858176435b17e66bdfe8e4111b742a333a51da42342ece3857061d9f7b0dddec131c0a211c94226669dd4dfa7e1b4a7d81e3df5e", 0x93, 0x8}, {&(0x7f0000000240)="fee41bc055b8666528e3cc3b5518d3669e95b19254572102b0a113e3d4cd0033149c2777d53527d30517655e58231dfd6c5a1440bd69775e5f198d5675694edddea54b6f21ce46ce0563a5b9654e04844918f1ea37bfcd4cf7d496b89afbd6a77c47cc3bc1641df31a5549fd11729386c4a9c45599e54bb54f9857534e9023a6aac458d8a4c82981ecf6b5b1b1b1492ae7a08e77b78fbf43ede77fc0ea9cf073ed7549a997630fdcecc8e2d8594ebf029a62ed284887bad26b3cf63e3d898a888400c82a870578ed79f20d6635ab050897ae", 0xd2}, {&(0x7f0000000340)="54c1128859b1fb8744447b3f799ec91bb5d5268baad132fa64fee969757ce4d29133fbbadb5560a1637ca6e75d52f2a1faa7e05be9df5bd83eea78829e2bf5b58d08e5ba9497e1fc3f9f5a0fd662e5514c927ef1fc9ee00280ccf370c618aaec38ac4dd19b82f467b5c2df8f2671966ba704525aa11815c0df9c73a3266ae40922fb21d797", 0x85}, {&(0x7f0000001440)="59e68d01cc764c4f7325452c7cc7aa5127a02b1e8993e7e3028f769d037eec1897a81802b4edc9154cf316871c339ca31d2c542104061d92aa9da927113dced4ea1d6a858614ef8de439386b44bc4fa29c4884035b0d262f4573065dbce614bb5e9a41a22e42129f1c56e36f8827aa7bb695375d8615b6063be78b903755ff849b62e41510790702f28add79932d1898043116fb33007cb42cd2a3fe3632024e05281d47218eeab359955ea13b60c11d762868439346f1eb621ee0ac17763ffe03156e50cc7473c4a279a8fc7069d39560b1a5197f1bcbd5f71a3d5b0f5eb8068cd03ac7815a12b7aee97c72", 0xec, 0x8001}, {&(0x7f0000001540)="91a1d8857316fadca0f22c0a8c92c8d55e513aaafd00ef830072670d5c962f14af4a1a50a73ae254f39cdf79fba54383e7eb0b01fffcd1b2443b568ff507328f0b63326429d2bbd28c546aeaeb32b7c6bd6c6c962ee7c118fc748ea236143e1b3fafea648bb57f377f7eb4c08f62da4c581f98c3cc37b021127ff90613e9daf98290a3c2c201a7c860cc73a437822e1237c6674f65cf2c1faf0d8f44de4fcb94d064a3f2657753c23dc47ca7e01ededd0c5acb732f6d05eb5e7a8909d8945a3e60cc733de2195e6a65e8c79564a15a50f97c9df16bb58e8040", 0xd9, 0x7fff}, {&(0x7f0000001640)="cc769e00ed41eca84c332acd5aefa6a675a72a14a25af8c72d8270a3cbfa7d14ed0c0f8ae0ee29e89db465a7ca31baed8ab7e14b54e555229057ff421fd0bb18e5d28cf93f8fde0f49c9f3aee3c193a047b930a9baae486362f823e8ddefd1b8868df567b29392d462c72561ae36e265044a7aeab258462f7bd4cef555b3e89403cef10055df27e8ce742f38e0b5688e230faab83247e1d1a555ebadeb6d343c21283a693b2e0e2a16a11f169ec8c298dd97d94a1eda6403e9a0f958863430c97105f88de069ee83f7acae63d5df835e48dc2bd1bb0f12e060c42ce37aec033ca03e7a8c2aeb0019d9234b7ac39c51ffe8ca2051a18614e19e5ccdc228700700b8847cfbede37fc5f1288204ab3d19e0ef565317941a5984ad7e4926015b6c5bd3484a284ad45c47cc56a0b8c45ae5306e836bb0c540b0465fc61ca83b1122a54fa8978d62cb255325a6c6500e94437fbb5f7b896aa9627370fb6f0c2efe8c689861f68cb818664ef03332eb6a380289676f0a67eab2d4f4476996ae3b40d8baeb786175c6524a7239076697cbb304233f01cee08355528ff62b0b5f4d90ff82deca498c0d25e4c14aa1fa2f31d3583f3d21240b1b806a65ba0ca851a5aa2bf5fc0669941daa2fcfedd5d2b11e44a19c609fedbaa6dcde7c262ec0ed7f148e6ec3d392aa083b8dc6a0ef260630d30b9cff6c762aae3d6af920ed0d2574452df4c1abccc81902528786d5defbd460376f501d54a81b9cf00e09cf784d997ba1bdd355cea6dad1ded62c8d9c28040db637ce02b55014a94fe551a5eafaf72427586d509cca1b2b2977dcc46877f8358dbf97ba5e250ea322ebf115418a62ed9010f5595f68ca5652aea79bc8cafbd4a40110c27599e7b1e094d161d6fee5e74df09676faea56149b71a8ac1061dff52d6272ccc3b65a1c75dbc93949866786cceaf5cbfb0e6f62659b58ead9ef20e030473b0f73043a558947b96e8ad81e028bdfcd3289d69fad54cd2cdf6d57888810304077f01cec63daaaa4bccb286407d8a46b519f429acdc5adf05566a1a2e7a3b17e6e8cc4f2ea0c331c8c9d1274650f2cc439d6b258bd68819a3f03abed37dd0a8b9af5eaa37d063c277f2d6530052aa87449ab34120920e8bab8334d2c1ddae999fe268ab6ecb13f9a5871171408495776498fdf3b14c329089c1fad97482310238ea23e502f0cc7d3a98690e70035454414b64c098d681314731aecc77cce80674971f38224daff2cf1c1c926672f77495bebc06d43f9aceb721a9b59cb17bb730127c02b065bfa38c5544c72029b7d0b09592682806f9b819089581bab068749715465b7d2d5d696c8f607eead49c9a8329c2c1da1a47a7bec59f411218cf34fd79a738873a19b36c38ea8976043fba8a1ecb76f37d514b20a5396dc682a18a53a322398ec5cbcd8fcb4b332a26a827cc7fa99ead6ac57d416bbcee5cca44c4ee845f132c322228d4391a955192cda10f52f1395d24df412fa304ca9d1a18a4762035111f18546177ba5b262bb8b9ebd2ba92fc543b3522ec15fa2ea1fa448c3ed733e1ca60de31616c294f2c43de5bbef56bc41a2b7929cb2a55bf11e6f856398bcd2e9f99c72e38cc1b3686839a2d635f04bc561fa068cc919c6d7dc9ffe7affab006abd294a52d56d11c08024850c10cb42eb547e37bfa03c4d8100c232376a2f67c9a46c61b0c21aec46abbbfbe1a9da1fbb09817d715f92f2dc92af598c1ecc83defd3676db52ea3fdb5e12226949c2f08824e54a4747246e9ec4c3b5c76b5747d3e4129f4efc91bb1da85320e4a148a285fd87b5a6b1ebd59363eaa591f0cc35ef731d65c65fefdad171ac717ed7bee49f86904f02fa9b1a3166496d5101121c76707df1b1dd22945382760ddce7a49d1fd79e769c7d1d489a066d0a0c49f09b1ad276cfdecbd3d307f94c6882999fccfb8427a82319c1b0cbd0cfc880b1dafa3a47dfdf12ca17d5601bc7e4ce0ecdcfdb0ae2572b17daeed04252d2a1fcbfa63877a1945ffee02ece2033154809dee7142de632e77183045ae3904713af4f1b72f81c51e14631244db6450646eeb638f532b780d5caaee168152c2245539c5d439608ae6e3329b95a0c0af9b577df39c6d7aa21e8f6ed430af31a86239109eef7e31f1d0f9b9397703941cfbf2192d9c74380932fd755ac6623309c91380600755bd41e7e9db9da83dd2c93d82e1ce9d793ee9852205300fc5d64fb49184b47584121c71290a3337b7561f10e3eb981534b8430fc0574fffd7d9a1c470f0b3d8a7c93767351314feb0488ead107e3da72c6294be6999ab9a0ab459b51c88bd1901ea7b5ecb5c217c9f8aae0beafc570cc873bf1da4217c0a602a50e46d260dfc06151f9d3d1c93da95ce110fe4a2c85eaebc9cf56bea0cb4d7269f702bb47fb8e2211fd48a90576c997c94c376a6b90be2a8bb90386a12242bc3ba99f03c1a03292a59a0d967e174aa2b70257359f62be3e9d957787f90095fa0b85f8607749f7f022fcf65607adc42e782697eed3f542751bdebe4be81497326c7939ee895c7e34a530564ac39b58211f12456b58c20af6d8457e118f956d3236b8b1a4b1fae60d09caea3c5f2f5e0e7fce450c09d36b3d8b690e37fe42f73f2b295d66868d6665ead22c8ec091a7519e7ebd90b2913b123239285f27c5b2d5a91ada9e3dd24e902cf0aad5736b2a4c1dc4720fad2b58206ea9b088cff47d1365fbe1d0cc3be04a78edcffdd76a421c0f82f6eb6f7fb65ed8ee77f11963431766ed5aeee6465760bba79b2991a8c49adbeb91a2884380b6cb34160a5ad146986049fe1264a5d89d099e831b5b023d09a00ab86dd39caa14ead0b2e7844e5a9d7558ff17dcd8d95fd3fd9458b5c820c910538ed7488c76de22096d7a5a629155768cd5e70a46ee5fc7fd25f06f35cbdd39b368f0267e8e35b47afb052c2cb185446466e2c89c5813a44679a7caeaa1772beb3091de78d2902ff2c0d8806a237895a25f4efa01b78b5b9b04a2cf6e7c390eea4aef404ed1e6f91aaa823a27b5d8ed2fb7c39127ec0f31b0d6e139aaa2df688248f78715663c287e10fed56fc88f4867ddbe57056d7ae7803953bb4b6adf05733a9b521f87657a74f243fcd5e8dd3957920128fafb4ad54b3fa8410468cc0138f53dc9590d81aba14135e331540a352cb41d741862276bb8ead92124c9f0781ef9c382312c148fe3e09bdb0204e318e6dc184d93fefb0dbda27b252eab3bae74a32b9dc6c4a32f29bb3524033a89c1130ed6d2d6af87db6bb373f024f95ba2adf74078c9707918cb83c612b2f20686d9b62a90591134d0c211791c77cf68879c9a054587daf6a91cce73a860e4acfd234ca8dad668f48c2648c78644999b9f2d9133433d76d36919e7edb666a1e8b348d8d34cbe8276174f646e1e9349d4ea339b10859c1dc555afc16676a6dcd9971927f9f16e22700613bb6f2d347e475d8d73e792c342f9e3f6b83895b38a950862d9c029b8857238a702b2d5a426865bf6e84492630c2d84fdaa676df4d911e6dbd6331017e93a715677b4a10d7e72cfa83b6148cc38d0d01b40b9ce9f372eec5aeec5ff627ba4015ee1b8061d1f14660fd14c9704f2d6e985afbbdf6946122908628a72f5277f4acb534ddde89e157553b5971a528c7abcf2750d4436bc59a4a1bf5be550667a179ce6dfc950bc92113e468ac63b6dfb0582a996c8761444c187b376dd1fe7aef33e75843bc829f4ff8bfa943451b48bfdfaa0a329179a0f2875149c79329c3dd08e0957238143db9b1c38ff51dbf436f01255909bcf188d38511664acdeafc10cce578c51181e08c5c7ab0672c3fe5263c6ec3bda50ad14eabddb6ee84a4e9d94e89887a711ec987f52521a0efa9f7f8ce3293dda8a7c14b613b97a6b7f733dde5adee31210d341942fd25e48775312b981544c24699cc6d9ac679266b54620510a6ffb05387f3ca226f640e486c8f619f3a1dd8eeffb586cf811fa46934ec722292df0c04735474a1e462be38076d3218b01367f31f3d441297029af7d7af732a6cb97310d2635779d64428d1265f65df837c1e2cd34d579ed57941dc5367bb8a7fecfc573b1c2b864b2513da1c217d7af7399887552eb080e62cd6be3d98ff6b16e90c723733cbd1fb68c65eaabb40853551c0a1588cab45246c958630fc4f8028c71076a37a029d3565cec86d459deda42ffec35c51b2b116f86dcdab78b78ac8e728073ec4c417bf01fab5e1db7b77bd54eee48faa0e058259ed89070b6cff15148d1235e674852233f168944c8eda0c1558aeee96b5bbc29c4cc6be7592574f18180a3b0f9534d94fa55a9ae2a16094304ae8fcd879f7ce71ff96af8009d1ca67681b575564f543da45e52c1d2c5cc909be49a591c2321515643ccbae8299840a243fda4c27d7d8bb9f5e84d4b1373609a37683c128f666363a409b766543eb13ddf02e29ae44b39ee98109b1f006863de380b85daca1bee244664210ce22afc5181268bc83ebda57d1ff75e95816cbeb2c6847c17dd7d7b9cddcc64c351ef331e6dc6a89909fbdc0d04c65e1447a29854e71caff827dd49347bd434c897535f7dc8162ac4a726a6a4d79066b586184fb88a1b8315c255176a51479ced46c1d3f8d0312396bc19577779ccc761c92482ec17e9b097b85fb7cf1dc54b5097442c126da8f7ae3206c29b88cbbd4a1f11b0ccd22db79ab72fbb7c44a4474312ae91ea169b284dd9f196f51998ea85e3c75a8001feca2c6a09cfa923d1909f2da3b0a3abb8dcee4cf68099cd96df736a7de5650be0c47d6fe410f16f3c089f56826e65d2b6a5de3986a748ea6dffd05af61c402cda5b4e93f5457f82e6d8be492e5823266e53d0f91147d2a5bd374398e4617b8374fbcdf2aee754fa9aef913c4d04f0c0edbaf4b542bf09ae42c2c2bc88b016eca19c2187608ffad23b4117bc46725dc799df675dda2e87d63deb0c770aece7f31a0132d309f31288b1205d66f4a817dbfd57413479e27d54fdfca5419cdedd0e59fcd8e903e3afda8991c06355958a574f8ada6a0fbba456f21f292bd943184833c323c0a28c9e76405735f6ae843140bf7af816a74e67db615bfebfe7fd7f33113b08a5ff906e86894fb976350f2ba46066137f8e48e532689a7d40eef93a92942337aa75ba4c04b5f005e85bff6608bcda17cb03df669b1e661fa999871cf5a03d445a20a5a0b2e26d9ded016c9df5a231aaa3d09aa3d243b99d8adac93dbd808b76f24b678a9f5fa560dbd986a5792737784a7d68dd3d48e503049ce73b58fc004a5a18a6641266a917016dc69018cf3c816cc04f270b6e5b427f1f25aa694d73aa834cff75ebf74ace37745c6e0e7fe23ff078871309e746a2ca25a76f9c581435bfb015bf49b9c04d9474bb4ba3b6f305d3c610e776399ed962fca97da60648b1b8b44337788bbbb67c8a570b2e72f86a496747642edcf5dd4d46660e4cc3d43d4e2e12a0af784ea2c092e0ceb156a7f822fd770a3b4dea18ddf822271554f71f73375e66ab7eb931c26c0066e38943563e6c114318c20010179927d294c05791468780230ae26178ce3a839eb71dee1736f116be399c67516547826d9cc0cf9cb37279bd7463e3e6403b7d74f5996ed76c72e435217ed30fdec13e92853da5a65d5a6fd71945e73b857302baf2fedb39d0016090d21237040d1dadf36b731dcf77b240d10ee32ca470d7424b19bc1e6dbbcb1fa432223ae3b298f0dfe2094cd4eed7cd82adf97883efce15675c564cca787f", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000002640)="8ba8ec40d87a6662c0e323b7505a20d55a7116866ea58be73b1a74639832c068724b262fa5cb743d79cf154f3a5cd1f65e420ba40509b630ab679eab1d903f9e6fef27ad2f", 0x45, 0x80000000}, {&(0x7f0000002740)="6e738279769f2f622e2edbb559caa7e50b0585489aa6ac03f8cb0b87836ff7f7be9bcb68910eb86d3995ee5b8466e12160cbbab6aff3269317c65f9c488856de86757326cd02d34f2afc58ac260f", 0x4e, 0xfffffffffffffffc}, {&(0x7f0000000400)="d1194c27bfe9eb1183bc6bde27474f605571aa3cc10af680", 0x18, 0x5}, {&(0x7f00000027c0)="2f42365a75a213733fb0240679bba3969d1dc19f11551315c780b77f391400cba43210b82356be03d78316bc393d69071a81965257b40aca93fc7d20d70a6e645ca0a7e31ee3cc2bac237cea9cd6a37728c1453bb58acc527efacf", 0x5b, 0xffffffffffffff00}], 0x1000000, &(0x7f00000026c0)={[{@nonumtail='nnonumtail=1'}], [{@appraise='appraise'}]}) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) gettid() fstat(0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = open(0x0, 0x0, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000000)="6dd56f6ae6ea49478c44", 0xa}, {&(0x7f0000000140)="e9b112fbb28b435e4fa52aab3f62df9d6de5d9899296f554145363", 0xfffffffffffffee6}], 0x2) r4 = dup(0xffffffffffffffff) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYRES16=r5, @ANYBLOB="000028bd7000000000000a000000380005000800010075647000240002000800030053ff0000080001000c0000e9070003003f0000000800040000"], 0x2}}, 0x8800) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000002ac0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe4090002}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="08010000", @ANYRES16=r5, @ANYBLOB="000426bd7000fcdbdf25050000000c00070008000100000001002c00070008000200000000000c000300080000000000000008000100050000000c000300aa000000000000005c0004001400010062726f6164636173742d6c696e6b00000c00012973797a31000000000c00070008000300010000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00000c00010073797a3100000000300004000c00010073797a31000000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00002400090008000100000000000800020003000000080001001a32986c08000200004800000c0001000800030000000000"], 0x3}, 0x1, 0x0, 0x0, 0x80cc}, 0x0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000002a80)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0xa8, r5, 0x60e3cc143e786ac4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7000}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x398d9ab502987c08) setresuid(0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xeba, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 22:21:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x2000000000007, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000200)={0x77359400}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) dup(0xffffffffffffffff) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) dup2(r4, r5) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000080)={0x0, 0x7fffffff, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0xc) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x5}, 0x28, 0x3) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x1f3) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ftruncate(r3, 0x10099b3) sendfile(r1, r3, 0x0, 0x88000fc000000) 22:21:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000040)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x280182, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0$v', 0x420000015001}) 22:21:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0xf944fda59bafd24b) write$cgroup_int(r0, &(0x7f0000000000)=0x9, 0x12) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000200)=0xb7, 0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) keyctl$setperm(0x5, 0x0, 0x31020100) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000140)) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000240)=0x80000003be, 0x4) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './bus', [{0x20, '!('}], 0xa, "d4740f"}, 0xf) 22:21:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyrng\x00', &(0x7f0000000180)={'\b\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x353c52de6a5449d1}, 0x2c}}, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) r6 = dup3(r0, r0, 0x100000) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000040)={r6, 0x0, 0xff, 0x3ff, 0x7}) fcntl$getflags(r5, 0x401) sendfile(r3, r4, 0x0, 0x8000fffffffe) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r8, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x2be, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r10}]]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x2, {0x0, 0x0, 0x0, r9, 0x1843a, 0x9152641df6d2fdd3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x8800) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r11 = socket(0x11, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') sendmmsg$unix(r11, &(0x7f0000000640)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x100, 0x0, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r12, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)={0x205c, 0x15, 0x1, 0x0, 0x0, {0x2}, [@nested={0x2048, 0x2b, [@generic="f5ee066f3f1e2816db47f46a3635a9e4a031a8c9541652a07a4588270da208c02a6e96128df9ee16d5dc4e471af46063741722909b3d27f9d91c38e54e5c1295d4f3d80a132ed2be0fc77463dacb008159129e3023d085695c658c2244ed3a9f235dd7d742aee9bfdcb51143a7408f8be95546283b3993d283f4686548b38852f350013060ad5361431a47f4e95a38680a86b322b134968d01808783f1b9be15abce2c1ba5e33b588abd4b2aa14c6b44905d4ada77d59e902d059388cdb3757717ea24b28779dba6c877315444f4da5fa2caf0d31af751519231815b8b213a285dbf420b3bc0648c2824dc3f6dcc95f95a0b65de166e024cd42169456f124d2b8536151ade06db671c6467536957b538b159c04e7c4aee351df9eef75e462d36a74907db9efcf843fa52925e28cac365edfb1c81952594109cdb6fbd6c4a6104482854eca3f24cfec1110054c3f7ed6cecfc6a4886b476cc55cc9e7e556ae27b1e49c81514510a4774f04d9b629110da41a04b016e5a7e6e1448f59d5bf618cf3444624209b8d431bf5898857f4f062e3f751bbb7ba83480f16de3ad08291614484e22c8b8b260cc3fd20625eca19ce0742d94e8fb1d57a938aec76da2b759c6c590381a61c243470362bb7c9e45a9af9bc1fb3fef7d35818375582c899164772a8a733111a72fbb9854a71cdffb61f3d42b853ad2b875dcb1c3d8e50501228c9b577980b42def63214b28971c9972a6405773bad681ca4235889010fd210e20cf9b38dabc7ac681544deb7979adb9c01074e7e0daaf9c2665899bd2e01c4e9bde255ced5d2fa361ea45f5b93d8bb1c2cd56cbc8a7194a733ea2f2a711bfc8e35af36ca967afcb52144937d4b3fe4e82adc6131c2c66f2858cfd185b3e6a523a49d7b3d8fb5c71534b62901091bc5a8de657d5fd8030b1ae4df83de7e291e4da21187f2fe94e67444865d1be7808ab7026e67e46983d1cbd32ccf44b122641bf3d4c05d796e5dc335e4af26fae3242431b0cb87453f595c73b6bc7043027979d009cf25ced43df789bcb694286c1f96ffeddad2465a735313c1fd798d69e110dc101472b1e0d11009afdee7a317045b2eae531f05552be1c69b4d4f64a91108990640afb33b22892b966dcd405d781b1eabf6e53d20dcc59b2d5a9769ab4d6167f537f22a03f3cc54b41c9089e7616a8a64304725c607c7883538a64cc8bb737f8e270aacf828167d7a6f65cfec7f77a3c1a42e9f355e4e84c0240961be135f5cbb5a2b11924aaecd71e5b402601d03f36655948fd8f6c0d2eba20fd5bf3c0a2b63b4479f0cd2e73bf4e4d00ded0fdd0d78b6106e4601abc11e6e327285a84c9b9eefc9298a38490ad7f6856dd23018260884d73321453f17c54e74e66c60177877e4fc22c2826551fd4f147533655d7121c586d0421c3d1e57f78716b9dd641bd20a665d6c57474034245c33a727e863a56e9434875b74aaf616a91328b360b43230093b3999ac27e2430723bf441ab4a8ca4f9796933ab07129366656a4fab3b5df07ffb01c964ad59f28972fca7aa42058d51db151cee892427ce0ac102b1001fc4b9a04bc39ec3aceba7fd3e31f88e6c9d472b99c4b6ef68b7f37e0ce7c61575f5fe63bad73936377cba43d4a1466ab2957d61b64b0f7572f13b5c749cae649253b778a1f1575323745e890db68df88104eb923a416d16b2f55ec0a7b358c34435c9b5afb22e0648bb972676dd3190cc0b28f98a28118ec5dba6c12f5e4b5a136148d0a3689e540c65790ac054e8cf5d7ccff3ded7744d5cbbd3d9371077f0924c42bc6b660c37b73df07a160dfd283c663ea3f382a640f78d58ea7b32bcd23f2e802825a91694a1d118c374ce5218fc9753894860d62d4628609ad29242483ce8923c58e1ce7770541a275fd94d89e88156273032058484f2c828830969ab8930ab5fec16b6eb779e583e4f74ed973210190c5f682c5397a235390ec8c15d9968d1f9532b7e1dcc3cbccbffbdd18684c9c70b3013890ee0ae166e1aeb2199ead535bc9e7b96513f7b90b1721d42f26905af17f41975abde8840ea4044af70692bd36d13a218140d0ef425b822ef73062d291e9a98fe3147dfd7785b6ca9e6327e244da3760030ea0601a7916e94b1b45b5ed83cb09759750ac16ccb630a2313d66c9d215196c39a5d9aa4d708e703519830a2d72877f31ade654bfee0c6eb24cffee228833026a84d6a7becfe92441fb360957b16256b7cf037dfc4ec56d067bec37caf9d80aa1f8d7b97efaaa55fa0aaecb40029c74ef0e2c0b7fea0976e2f4e581c9ba43548ca482c3aa70944bf95cd79201737c5185509d1e4755bb71097c5c4b3a621e751840ade2a7ab9124d0192e23b2cff3290b032a2271aabf92f7703c4c8d495c0e30069201316c52d26273bb14bd98c04ba780d8551b4241d62b622a5fbdb93dd219685867f1b38d31b0eb1576c32ca9181cb018d010d7f3865680491e3f5d3ce36ad0123ab19a2d65c7cb0dfda98b3ec7321256375443fd327046bd3ffca9403bbcdd393ce22595c8b28fe68a7de8f6849b8f81e42572fcc2c381a4ddf55052ec0aeb204dc28307093f64cc8890b3912f6014e0e9ada3759a5a5678303fd1a6a32d0f5fbf833adbbb34d37b1a15324eadc65f366b3a7679a37abe367581a0c607f8be05cd7c4fbc9d4d46ef14b9f42e52cd52233a86c63db83ed15f59eca2dcb67e96ecc45b2c774b4a7eb4e0c147c4e2d7ae5a4b1bcbd024f3693cf3b1cfb77a3e5cb5a01016835e1b1cd2bf4fbda1945d6c891a31d7f71b757d39b9e618f777c59d14bd5c6a1bb4f73d02e046307e675c4ccbe9547dd956c84e0aaab97b0e75dbd88cc8cbedf05bc2f3010c1f67fe2afe4c4703d963a3cc032b16d7d552f042beeb1d7d69387323c2cb383c8193f40e2430dbdd313d1cac5b7fb6c7b49f6a37558ad1ed66447a2d2596139e8785437759f852b6049d117a3111b996cff0b69fcfd02f6a0096ee80d000440c0b49573df3d9261c65b3dd0cf89b9d4d3f3eae7853a00973ebb8f6aebcfdc853e8091007b5df12c5bb78be7eda3d3501acfcf698d7a409e1fa7fea7fb374eab71b5ef984858214d91320998dc726b67feaa94266ebbf67c945b621ca3fa2348d064e4496785a58258a298d6653009e9c6993122e48d030338ad613f0684d0f4b3d527a8cd852ab6c1317db252153784d4264a596a7fa3f7394f5a2a97ff661bd7aac94198905fafe738b80e7cc0f3f9e556b663e21805d78702c46163fce3fc460a5aea7d3874038cfab1eae95fd2ae5e5bf660d767ca8dd90ce7edd8760e679e45db786e76e5ae2b559cac0ad6ea442fbb478ae477c2314503202d9353f0f5321feb7f8b2260783bdfdd96ec78d3040a54b75040b3d061841fb8c9f8cef161b2635b33a07e5842ee6d87bba2061dbcda44af52ae2e62ce548c271ede3a6b5c5c53e2c66adc89db785600a44d63ba51a98b1f22693d531a813eeebce513240dbb2395718c6122a923fbf599c886627b62ddc563d548e27d47536b6caad3215588097e5df806c1ab6f9c89e52d1c796fbee0a18f913c52706988a5325a3d644498517578d3502454b4f651aa612bcfa138d2226c2763ea60b04f6d9abf49ebe8f4bf70fc3aabaaa9f506737bb83798815ed682d7434f8449c92eb5015db98dd71266426b25a3265fd4b6a25472b921b9ff4f2d3935f642716d0a5b59dc3ae6ac3aaf9df66fa9e700c7803fe06045c06e4b6124166e3cf9360bc2121ac2a0fb9c1d49959a944e71a47455e97e80f43a6daaa906d08b4e9c2fa7350f5914034006342e7b24f1345ac21726a4ca30f9d4d85c67bddec36dd329e4e73f0da452a37a053efeff5ffb9f1976bf0fbe469fe8f801a50b1aac8df96064b365e169a50ca0fcf4dd41c1c6743e35d33b59107e243c2557720cd839a5e0526e44841c7bc7eb24ae78e9e7b389e4a3722182a4c5a563ee2d78e334c9ccb9b01613f4a484739f061d1c89f2cce542034925d2cac932b28225e1548a3dafe35656467a00892b4b57857e505d6e05457b47e00816953e62fd5dbfadebc89b5fae2ee13954d9d5f864c891c5c995a629aa2519d719cf33cb02f113800e74816f028be1a3dd43420779a64ba14ee2408631bdacfb79954f5af714aa6c015edb4ab05c43c2f48f5bd9b38521754771fcc88544e21a30ff4870c17bb9609cb4669fc53754381e21ef07f747e7480024e50e09c17e2b867856adcfbd8e3fb22f5c23392e88088c37009b5b5cd9ac9805cfe7cdec6e08e88761e7e4ab468c702394c9ca5cf219947cdb808f071edce861141e36531291e7d6cc707644d0e2263acd0a23922f0795c9d36087839f05455673f0b5a5afdc7b06ffd67ccc81f1d1d44a2d966eb6d0a6ec1ebbbb0083d95b4be91e7fdf3c73967af8e92cf815108cb0df6fce21793a457bd9d7b472d593fd101c4f5500d84264237b0dcb8635b828b3f6567917bfd82104b8288b73ee4d2cb81d767676079ada76c5a0ddfb7d8ff1d32c09b4e7be0ab5076d61c03a80cf1027beb00152b0b57c16495a28e0bf576c89e369d3e09dbe5516ab83205f71280983b42e200518b47ddf903a681b5e5585fa5bf1d11bdb41cc821574f76457238d24d4d17923ac09fdc7a5ab44612d65fa3534771ddd45830c288d961560d038c1cae6abf06f272213685438e84de5e14abb8bf8067660b7e38a51d2af74442fddc65443c9335075a67ec1d406929e4b923eb7d8a31a87198187a7fcca590e42b846137f00d1c7c64fca2844132d0c5b12012b3c8dc36458ef5e651d97a4e1fcc3159482e1efa31e00ebdfc8052c56095dc9c9cd6569f57dc6d8c2822be81028850ef5f9a09eea8aa254b63a4d6cc7788bdb9b73cdbcf0072305c21c265c4bdafef719a85195efd5a0f4696abe80e76c97ab866ddee28c048e510fad23baa588ec12b38d8eecb7b68e89e2ae7533e0809c8bf3b7b902a8f5f8c0e609e0b4bdad38c5808cae7e1755d61bdc0c89a2d05981696f842ebde6a19858a0583166d774d6f6fdb9bb00f8758254994e11cfc06ced276aace344a74643026f4b7fcf95e60630ca94ba84a1e6303a3820903eb3f65f3ae98e72523bdcada7191d30e03f3751622585c411236fa0e26e8ba711e57e654c0fdedcf3eb5b422a4bb84b310af5bd271f628fa0554b2fbbcfdb62688708369120b71410f639e7d34b664ba4319b60d0b97f7315457084c6ae3e4eacdae1fdcf3b8c67566e9077c00f723bd14622c374fa1b53092f86811cefee153b6cd88add66e7c9cacf345079cb1ddd9414e57cb4fadc6db725f1270a5fdb345972cd3be2692da54ec5d9bb47b16e2163810c39b901692dc19c826cbd60c4055e43ae8064cf34736c88cd5c437c9d470971e080401a70d7de7262b7e2b3c939f0bd43feb960d19958bf4d8c2ed7b9ae83f7caf0a1558ab1fbf92525d33dd867dd251be061219bb096c56e6845ae3084e761411b330c63b11e5b38a452525e7e5e45396c85d943620a952f982d7984ec7849a6484cf8ff4d0415fec496623405311355b0492026d8ef5738d6808e7e4fa69864cf8bd5eaea65869db7a9a752f9eaf0c3d917a95d99fa2ec6f82bc279985cee9228104f3c5d2f1cbd5b9f0522a0472d5924eeb187deb7611ee5e63a8793f73830ee1f6047d76ce9d0203041d04a339d71af468160466235ecc9ea8c8ac34482f7dc31dc09cb8fd9672d7282ffdae9db0de7d52dcf251dc9c0872eda8720503941a6990c21ca624228", @typed={0x8, 0x68, @uid}, @typed={0x8, 0x11, @uid}, @generic="b419edc9463008ae7381d0c44ba0df9892cc3319d1aae3c2abf263eb1d09c441c221fadc5200828debf9", @typed={0x8, 0x69, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="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"]}]}, 0x205c}}, 0x0) 22:21:11 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001f000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0xc6}) dup3(r1, r0, 0x0) [ 1811.885653] kauditd_printk_skb: 229 callbacks suppressed [ 1811.885662] audit: type=1400 audit(1574202073.801:268473): avc: denied { map } for pid=11020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.918202] audit: type=1400 audit(1574202073.831:268474): avc: denied { map } for pid=11020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.940711] audit: type=1400 audit(1574202073.831:268475): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.968896] audit: type=1400 audit(1574202073.831:268476): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1811.993344] audit: type=1400 audit(1574202073.841:268477): avc: denied { map } for pid=11020 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.020881] audit: type=1400 audit(1574202073.851:268478): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.045797] audit: type=1400 audit(1574202073.851:268479): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.074563] audit: type=1400 audit(1574202073.861:268480): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.099173] audit: type=1400 audit(1574202073.861:268481): avc: denied { map } for pid=11020 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1812.125294] audit: type=1400 audit(1574202073.901:268482): avc: denied { map } for pid=11021 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1816.898203] kauditd_printk_skb: 1054 callbacks suppressed [ 1816.898213] audit: type=1400 audit(1574202078.813:269537): avc: denied { map } for pid=11140 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1816.958794] audit: type=1400 audit(1574202078.813:269538): avc: denied { map } for pid=11140 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1816.988576] audit: type=1400 audit(1574202078.823:269539): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.013002] audit: type=1400 audit(1574202078.823:269540): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.040989] audit: type=1400 audit(1574202078.833:269541): avc: denied { map } for pid=11140 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.069946] audit: type=1400 audit(1574202078.833:269542): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.111448] audit: type=1400 audit(1574202078.833:269543): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.166725] audit: type=1400 audit(1574202078.843:269544): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.221477] audit: type=1400 audit(1574202078.843:269545): avc: denied { map } for pid=11140 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1817.270792] audit: type=1400 audit(1574202078.883:269546): avc: denied { map } for pid=11141 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1821.905438] kauditd_printk_skb: 1110 callbacks suppressed [ 1821.905448] audit: type=1400 audit(1574202083.826:270657): avc: denied { map } for pid=11265 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1821.959107] audit: type=1400 audit(1574202083.836:270658): avc: denied { map } for pid=11266 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.006914] audit: type=1400 audit(1574202083.836:270659): avc: denied { map } for pid=11266 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.048976] audit: type=1400 audit(1574202083.836:270660): avc: denied { map } for pid=11266 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.098987] audit: type=1400 audit(1574202083.836:270661): avc: denied { map } for pid=11266 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.149315] audit: type=1400 audit(1574202083.836:270662): avc: denied { map } for pid=11266 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.194551] audit: type=1400 audit(1574202083.866:270663): avc: denied { map } for pid=11266 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.219534] audit: type=1400 audit(1574202083.866:270664): avc: denied { map } for pid=11266 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.250741] audit: type=1400 audit(1574202083.866:270665): avc: denied { map } for pid=11265 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1822.275762] audit: type=1400 audit(1574202083.866:270666): avc: denied { map } for pid=11265 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1826.928924] kauditd_printk_skb: 1130 callbacks suppressed [ 1826.928933] audit: type=1400 audit(1574202088.858:271797): avc: denied { map } for pid=11395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1826.986506] audit: type=1400 audit(1574202088.858:271798): avc: denied { map } for pid=11396 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.026547] audit: type=1400 audit(1574202088.858:271799): avc: denied { map } for pid=11396 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.069398] audit: type=1400 audit(1574202088.858:271800): avc: denied { map } for pid=11396 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.094190] audit: type=1400 audit(1574202088.858:271801): avc: denied { map } for pid=11396 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.122297] audit: type=1400 audit(1574202088.858:271802): avc: denied { map } for pid=11396 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.145788] audit: type=1400 audit(1574202088.858:271803): avc: denied { map } for pid=11396 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.178788] audit: type=1400 audit(1574202088.858:271804): avc: denied { map } for pid=11396 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.203772] audit: type=1400 audit(1574202088.888:271805): avc: denied { map } for pid=11396 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1827.233923] audit: type=1400 audit(1574202088.888:271806): avc: denied { map } for pid=11395 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c2", 0xe0, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:33 executing program 4: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x18000, 0x58) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 22:21:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x74d, 0x20ac02) dup2(r1, r2) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r3, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r6, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r6, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x8, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x10) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() setsockopt$inet6_int(r0, 0x29, 0x42, 0x0, 0x25a) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x21) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:21:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$9p(r0, &(0x7f0000000040)="02e40217b828cb926d5d01e0392a47e306640f25", 0x14) write$P9_RREADLINK(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="ffd934aa54cdfc17009c5b726f13012f66b000000000e00200ffbf1f86c04d7e8ccf112d7baa01e025af2ac3e1b68af96a5ebae9540000d6ee4398d0dfeb"], 0x3e) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 1831.937970] kauditd_printk_skb: 923 callbacks suppressed [ 1831.937979] audit: type=1400 audit(1574202093.861:272731): avc: denied { map } for pid=11506 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1832.243865] audit: type=1400 audit(1574202093.861:272732): avc: denied { map } for pid=11508 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:34 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)="3900000011000904aa570700000000000700ff3f04000000450a01070000001419001a00050096b4ca7a0000080000004000008800005d14df", 0x39}], 0x1) [ 1832.381999] audit: type=1400 audit(1574202093.861:272733): avc: denied { map } for pid=11508 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:34 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 22:21:34 executing program 1: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000240)="e59d75b938661d39bfb2db2ef8d07175d74d3a67f4970b25eb3f0d3daece098310649659559ce16fbb0d409333a435ad8f614cb4c604a2d11b4323714ef8764206cb576453133886801c623c78d25dc9f6d1b251fe20054d95058da4d0d4908debafae8d97decc8a8efed714676f0941a1e57c087a5b13896d673696b3d4b391df639de67dbd87656a2b6a7dfcfdeae762f41e3dbf6d7dd4e324d92690c7d7e5ffa4695154d913") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000300)=""/251) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0d0a18db43915e3a702a9d8aea872943afd874e2f98b579a7186270146d0e02c06cffa8c67cd7dcc6760253ef0b2a20a602210318f8104a27ea57b012d31c34951cc119dac04eab9c68842086234a45fbe20200000000003b", 0x66, 0x400}], 0x0, 0x0) 22:21:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c281659391", 0xe4, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:34 executing program 4: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/216, &(0x7f0000000080)=0xd8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x16, 0x0, 0x0) [ 1832.540578] audit: type=1400 audit(1574202093.861:272734): avc: denied { map } for pid=11504 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:34 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r0, 0x5, &(0x7f0000000140)={0x30, 0x4, 0x14}) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x0) 22:21:34 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x380000a, 0x11, r1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0xac, 0x1, 0x8, 0xfffffffa}) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x252) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x200000, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) getgroups(0x2, &(0x7f0000000800)=[0x0, 0x0]) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000000340)={'bvo\x01te\x05\x00\x00\n\x00\x00\xf0\\\x9e\r\x00'}, &(0x7f00000003c0)=0x78) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)='Z', 0x1, 0xfffffffffffffffe) r7 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000002040)='\t', 0x1, 0xffffffffffffffff) keyctl$unlink(0x9, r6, r7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x4200, 0x400, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) [ 1832.714658] audit: type=1400 audit(1574202093.871:272736): avc: denied { map } for pid=11511 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1832.819648] audit: type=1400 audit(1574202093.871:272737): avc: denied { map } for pid=11511 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1832.898977] EXT4-fs (loop1): couldn't mount as ext3 due to feature incompatibilities 22:21:34 executing program 2: io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) setxattr$security_capability(0x0, 0x0, &(0x7f0000000380)=@v3, 0x18, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000440)={0x3, &(0x7f0000000400)=[{0x6, 0x7}, {0x400, 0xbb3c}, {0x7, 0x1}]}) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) recvmmsg(r4, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/141, 0x8d}], 0x1, &(0x7f0000000300)=""/93, 0x5d}, 0x2a}], 0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000840)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1832.932037] audit: type=1400 audit(1574202093.891:272738): avc: denied { map } for pid=11506 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1833.098704] audit: type=1400 audit(1574202093.871:272735): avc: denied { map } for pid=11504 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000004000"], 0x10}}, 0x0) socket$unix(0x1, 0x6, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x400000000000282, 0x0) [ 1833.313329] audit: type=1400 audit(1574202093.911:272739): avc: denied { map } for pid=11510 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:35 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x3b, &(0x7f0000000080)={@mcast1, r2}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x10}, [@ldst={0x5}]}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x135}, 0x48) [ 1833.553330] audit: type=1400 audit(1574202093.851:272730): avc: denied { map } for pid=11516 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:35 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x101000, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000000c0)=0x5, 0x4) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/s\b\x00', 0x200000, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x240840, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x24, r4, 0x1, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3d8}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x20000008) fstat(0xffffffffffffffff, &(0x7f0000000380)) getgid() lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/311], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x4200, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) r5 = memfd_create(&(0x7f0000000140)='\x00', 0x0) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) ioctl$sock_SIOCADDDLCI(r6, 0x8980, &(0x7f0000000540)={'veth0_to_bridge\x00', 0x1f}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000000)={0x2, 0x2, 0x7fff, 0x20, 0x47de, 0x1}) 22:21:36 executing program 1: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x800002, 0x0) lseek(0xffffffffffffffff, 0xff, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) unshare(0x20020000) creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) lseek(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001040)=ANY=[], 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000340)='./file0\x00', 0x8, 0x0) mount(0x0, 0x0, 0x0, 0x68, 0x0) unlink(0x0) [ 1834.356295] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 1834.421215] EXT4-fs (loop2): first meta block group too large: 4294967295 (group descriptor block count 1) 22:21:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) stat(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000380)={{}, {0x1, 0x8}, [{0x2, 0x2}], {0x4, 0x3}, [{0x8, 0x1, r2}], {0x10, 0x4}, {0x20, 0x4}}, 0x34, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805) lseek(0xffffffffffffffff, 0x0, 0x1) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000000)='mountinfo\x00') fcntl$setsig(r4, 0xa, 0x33) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) 22:21:36 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f0000000000)=""/126, &(0x7f00000000c0)=0x7e) r1 = socket$inet(0x10, 0x10000000003, 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup2(r1, r2) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000340)="24000000fa0307041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e28000000530403000000a0aa1c0009b356da5a80d18b6e064467bee28f803b5ee9fd62662455a4df", 0x4c}], 0x1}, 0x0) 22:21:36 executing program 2: io_setup(0xffffffff, &(0x7f0000000400)=0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) pipe2(&(0x7f0000000000), 0x4000) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x4, r1, 0x0, 0x0, 0x0, 0x0, 0x2, r2}]) socket$inet6(0xa, 0x0, 0x6) pipe(&(0x7f0000000100)) r3 = creat(0x0, 0x0) syncfs(r3) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x11, 0x80002, 0x0) dup3(r5, r4, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f00000003c0)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)={'filter\x00'}, &(0x7f0000000200)=0x54) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_ENDIAN(0x14, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) pipe(0x0) [ 1836.945897] kauditd_printk_skb: 266 callbacks suppressed [ 1836.945903] audit: type=1400 audit(1574202098.873:273006): avc: denied { map } for pid=11614 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1836.973993] audit: type=1400 audit(1574202098.883:273007): avc: denied { map } for pid=11614 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1836.996353] audit: type=1400 audit(1574202098.883:273008): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.020763] audit: type=1400 audit(1574202098.883:273009): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.045104] audit: type=1400 audit(1574202098.883:273010): avc: denied { map } for pid=11614 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.068049] audit: type=1400 audit(1574202098.883:273011): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.092910] audit: type=1400 audit(1574202098.883:273012): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.117728] audit: type=1400 audit(1574202098.903:273013): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.142434] audit: type=1400 audit(1574202098.903:273014): avc: denied { map } for pid=11614 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1837.167037] audit: type=1400 audit(1574202098.953:273015): avc: denied { map } for pid=11615 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.955335] kauditd_printk_skb: 947 callbacks suppressed [ 1841.955348] audit: type=1400 audit(1574202103.886:273963): avc: denied { map } for pid=11720 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1841.983419] audit: type=1400 audit(1574202103.886:273964): avc: denied { map } for pid=11720 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.009438] audit: type=1400 audit(1574202103.896:273965): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.034781] audit: type=1400 audit(1574202103.896:273966): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.063450] audit: type=1400 audit(1574202103.906:273967): avc: denied { map } for pid=11720 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.086540] audit: type=1400 audit(1574202103.906:273968): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.116888] audit: type=1400 audit(1574202103.906:273969): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.141986] audit: type=1400 audit(1574202103.916:273970): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.170893] audit: type=1400 audit(1574202103.916:273971): avc: denied { map } for pid=11720 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1842.195524] audit: type=1400 audit(1574202103.956:273972): avc: denied { map } for pid=11721 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1846.960082] kauditd_printk_skb: 998 callbacks suppressed [ 1846.960092] audit: type=1400 audit(1574202108.898:274971): avc: denied { map } for pid=11832 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1846.988473] audit: type=1400 audit(1574202108.898:274972): avc: denied { map } for pid=11832 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.026570] audit: type=1400 audit(1574202108.898:274973): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.064882] audit: type=1400 audit(1574202108.908:274974): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.089350] audit: type=1400 audit(1574202108.908:274975): avc: denied { map } for pid=11832 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.118078] audit: type=1400 audit(1574202108.918:274976): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.144091] audit: type=1400 audit(1574202108.918:274977): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.171777] audit: type=1400 audit(1574202108.928:274978): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.196659] audit: type=1400 audit(1574202108.928:274979): avc: denied { map } for pid=11832 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1847.224852] audit: type=1400 audit(1574202108.968:274980): avc: denied { map } for pid=11833 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:51 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x161042, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000480)=ANY=[@ANYBLOB="02000800e1f28a95fa22df0e54032f24"]) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x28060110}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000160000df25003de40085759792a706fc464608010bf01fae75e985de685c5bff5dd93141aeb562c439c63fc58cf2843b4e6d5dec2ea34905c361e8a9f9ead5845c33cd303d824388c2d0e2e0f9f86df4abc8ab5ea0da1de2ee2ade30a9c81f4775c2752a97aa48c007df913ade47b36844306e85ceefd4e2dcf64d594d90ef5cac78860b47c44ccd6d181090040cf3d028b58f647891b0b73cb0f69bc7ff8754a08807f4a9b43cd0db41e1790ef4fa666165e93bcbbdfb47"], 0x1}, 0x1, 0x0, 0x0, 0x21e8732883d3ba37}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r5, 0x0, 0x9, &(0x7f0000000240)='user.syz\x00'}, 0x30) pipe(&(0x7f0000000180)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x20, 0x7f, 0x1, 0x98, 0x0, 0x0, 0x400, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x6, @perf_config_ext={0x3ff, 0x81}, 0x21e41, 0x2, 0x0, 0x4, 0x9, 0x3, 0x9}, r6, 0x1, 0xffffffffffffffff, 0x1) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r7, 0x1) fremovexattr(r7, &(0x7f00000004c0)=@random={'osx.', '\xa8\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x2503, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x9) setxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='user.syz\x00', &(0x7f00000000c0)='selinux&GPL\x00', 0xc, 0x0) 22:21:51 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="43020000010000df08000a00", @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c000200080005007f000001"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 22:21:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) socket(0x8, 0x2, 0x7) 22:21:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffebd) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 22:21:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) openat$urandom(0xffffffffffffff9c, 0x0, 0x111200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'veth1_to_hsr\x00', 0x11ef542d881850d8}) r1 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) creat(&(0x7f00000001c0)='./bus\x00', 0x257) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x68, r6, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7fff, @media='udp\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$security_capability(r7, &(0x7f00000004c0)='security.capability\x00', &(0x7f0000000500)=@v2={0x2000000, [{0x6, 0x4}, {0x27d, 0x4}]}, 0x14, 0x5) 22:21:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c281659391", 0xe4, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=@ipv4_newroute={0x20, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x3}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r1, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r1, 0x1) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000000c0)={{0x3a, @rand_addr=0x5, 0x4e20, 0x0, 'lblcr\x00', 0x20, 0x1, 0x6c}, {@loopback, 0x4e20, 0x3, 0xd7b, 0x6, 0x1}}, 0x44) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000040)={'security\x00', 0x2, [{}, {}]}, 0x48) 22:21:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c281659391", 0xe4, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c785255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab569f8e39808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd113acf060c105020d4882fc399eaabc787f0db64a0490", @ANYRESHEX=0x0, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296c43b3897cc275fd8fc333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad0300dfdaf3d0fef215586de3c1"], 0x0, 0xe9}, 0x20) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x100000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f00000002c0)) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r7, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r7, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r7, 0x1) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) fsetxattr$security_evm(r3, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x11, "2bdca4c20ca960b8df49"}, 0xc, 0x1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/cgroup\x00') 22:21:52 executing program 1: r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="84a60ed9e01f5210bd5238c7a1191d8fa7651fec1ab7e950d14112ef45a1b5cad3d4c58c91baad08060950913589b147227709bf279d04f0a53ddae4bb90f1b2a139d71aa2f4adbeb49ec7a65b9f26c3bb08bc4abcd1fcb46ea891f372f4256f7ba0b45cdaf605b9efc21c944812159296caa793b7e2a4337bf46eb1489de6a1f3c0d988fc67672ffb5aea28", 0x8c, r0) keyctl$update(0x2, r1, &(0x7f0000000180)="2e588f101af0c5ef3be160b899051c2e0b", 0x11) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000005100000000000000000000000000000000000000000000000000000000000000000000377012608144a61e697d322420ea876a5ba9d7d938f9f381a5c5cd64d4cee7f8a5eaec894c5e805996a071884704c97e2679464e10"], 0x68) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$TCSBRK(r3, 0x5409, 0x1) 22:21:52 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a54f) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) syz_open_procfs(r4, &(0x7f0000000000)='mountinfo\x00') 22:21:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b5", 0xe6, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:21:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) socket$unix(0x1, 0x26bff718c3e2499, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x52000}}, 0x20}}, 0x0) 22:21:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) dup3(r2, r3, 0x0) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaa", 0x97) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000400)=@gcm_256={{}, "f6f0a15575727b51", "1c7f492b85274e9753c78dcceba83d04bb8650819812ef1deb563113790fc5ed", "4b002a9a", "26a0e859e24aec42"}, 0x38) vmsplice(r4, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') timerfd_settime(r5, 0x1, &(0x7f0000000440)={{}, {0x0, 0x989680}}, &(0x7f0000000540)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000006c0)={r8, &(0x7f0000000580)="0849f74bcd5811d86fcbe4941c9f09002b064b151e056b33ce440c08a25808e1", &(0x7f00000005c0)="2f04454ada0f0d41ceff5ef549b73fc3acf5dfe1a565153e797d14e6024bcc340242b15e68b1d768d14f683aef9911c08e13e85bee68d3a549e03a98a1c51ef6fa80d8b38c8c3a4a93c8b894a048b5761a6ebf0251b531e5c9a3ebcfce5f0070dc3a3de6697cc10967181b925bfb9bc27158b97e80942e387bc55a76d40076a37b48f9178ebe1472a7760058860291554506cbeb9f97bf1014c75cab158811b557095d69e9fdba4395c4af91cc76bfad2d08aa84b77bbaab75aadc2591386d35a2e98fd209fe", 0x8}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000001, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') r9 = open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) ioctl$TIOCSSERIAL(r9, 0x541f, &(0x7f0000000380)={0x3, 0x9, 0x80000000, 0x79, 0x0, 0xcf, 0xfffffffd, 0x8, 0xb41, 0x6, 0x3, 0x3ff, 0x1000, 0xff, &(0x7f00000001c0)=""/211, 0x2, 0x8, 0x3}) 22:21:53 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4b33414b70050b0a}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x43e) close(r3) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000001c0)) creat(&(0x7f0000000080)='./file0\x00', 0x43e) close(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x9) creat(0x0, 0xfffffffffffffffe) sendfile(r0, r1, 0x0, 0x20000102000007) r4 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r4, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32], 0x1c}, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0)="fc0000001d00071bab0925003a00070007ab08000800000000000200210001c00000000000000012003f000000039815fad151ba0101099cecb94b46fe0000000a000200765f8c03036c6cdec64fe52fb5562ab55b44a7aed9df0d11512fe0cad44000000000008934d07302ad237ed20100fe7b0000005538000033d477e280fc83ab825ef8b29d3ef3d9a48a170e5bba4a463ae4f5566f91cf990201ded815b2ccd243fa95392a01040000000000000000066bcee583df150c3b880f411f46a60467b4d57155870271bfe9c8c077c34d3c0fd5f79a58a10000c880ac", 0xdd) prctl$PR_SET_FPEXC(0xc, 0x10000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) 22:21:53 executing program 2: prctl$PR_SET_PDEATHSIG(0x1, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000100)=0xfff) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r1, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 22:21:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x4439}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000500)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000d80)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f0000000c80)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xfffffffffffffd38) stat(&(0x7f0000000900)='./file1/file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fstat(r18, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r19, 0x0) getgroups(0x5, &(0x7f00000009c0)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r21, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r22]) getresgid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r24, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r25]) getgroups(0x1, &(0x7f0000000ac0)=[r25]) lstat(&(0x7f0000000b00)='./file1\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r28, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r29]) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fstat(r30, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000300)=[r31]) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000bc0)={{}, {0x1, 0x5}, [{0x2, 0x1, r5}, {0x2, 0x6, r7}, {0x2, 0x1, r8}, {0x2, 0x0, r10}, {0x2, 0x6, r12}, {0x2, 0x4, 0xee00}, {0x2, 0x1873c1e02337ce13, r14}, {0x2, 0x7, r16}], {0x4, 0x3}, [{0x8, 0x16b58e701429d005, r17}, {0x8, 0x5, r19}, {0x8, 0x1, r20}, {0x8, 0x0, r22}, {0x8, 0x5, r23}, {0x8, 0x0, r26}, {0x8, 0x0, r27}, {0x8, 0x4, r29}, {0x8, 0x1, r31}], {0x10, 0x5}, {0x20, 0xe}}, 0xac, 0x1) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xd) r32 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r32, 0x0, r3) dup2(r2, r3) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='aXto_da_alloc\a\x00\x00\x0000000007fff,dont_measure,\x00\x00\x00']) r33 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r33, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r34 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0xc63, 0x0) ioctl$IOC_PR_RELEASE(r34, 0x401070ca, &(0x7f0000000200)={0xeef8, 0x5}) listen(r33, 0xffeffffefffffffb) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) request_key(&(0x7f0000000440)='.dead\x00', 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1852.342806] kauditd_printk_skb: 401 callbacks suppressed [ 1852.342816] audit: type=1400 audit(1574202114.271:275382): avc: denied { map } for pid=11945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.549431] audit: type=1400 audit(1574202114.311:275383): avc: denied { map } for pid=11945 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1852.657765] audit: type=1400 audit(1574202114.391:275384): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:54 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x3}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000600)=ANY=[], 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffef4, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200)=0x78, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="e0", 0xffd4, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000240)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) getsockopt$inet_opts(r3, 0x0, 0x4, 0x0, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffc, 0x232, 0x2, 0x0, 0xfff}, 0x14) socketpair$unix(0x1, 0x2, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) setsockopt(r4, 0x10e, 0xb, &(0x7f00000004c0)="9adc01ce", 0x4) sendmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff", 0x23}], 0x1}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x9) setsockopt(r5, 0x10e, 0xb, &(0x7f00000004c0)="9adc", 0x2) sendmsg(r5, &(0x7f0000000400)={0x0, 0x29a, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e", 0xbf}], 0x1, 0x0, 0xffffffffffffff51}, 0x101) r6 = socket$netlink(0x10, 0x3, 0x9) setsockopt(r6, 0x10e, 0xb, &(0x7f00000004c0)="9adc01ce", 0x4) sendmsg(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) ioperm(0x5, 0x5a, 0x8935) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1852.749112] audit: type=1400 audit(1574202114.411:275385): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:54 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x4) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x8000000000086}) fstat(r0, &(0x7f0000000400)) fcntl$setstatus(r0, 0x4, 0x44800) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x16b2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00?\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x108, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x180) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0xb2) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0xffffff80, 0xd0, 0x11, 0x3a, 0x0, 0x1, 0x25, 0x2, 0x9, 0x1000}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) [ 1852.854006] audit: type=1400 audit(1574202114.431:275386): avc: denied { map } for pid=11945 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:21:55 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) getsockopt$inet_opts(r0, 0x0, 0x9, 0x0, &(0x7f0000000000)) timerfd_create(0xb480c99939b3534f, 0x81000) sendfile(r1, r2, &(0x7f00000001c0), 0x20002000005) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000380)="e22a20adca3290b4dd087b45d46e4fbbb3bc1d608186a1479297d2738f184237df320db6a905427eb32e0be15d92cfdff75aa65e6e0aa1024cdfc8a741a6c614b4b0966d9cad3fe5c959899b29678daa204f5e2e9dd99f18b84722e2977bf7519f06eaffb02be14e049cd1c8c934bb4fce5e9b73148715d3625d68a6d7d8538f0ecf3d9430d4b95c9f7affa2ec2e61ba80a019579ed99514f194c28db2ea706433dad27433c48e93a8d62aa640ea8a7d1ad7cd39cc36c2f4cb20a2fffe9c8f1c3ff7b4b539bada19d481a33b890bf3") r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001980)={&(0x7f0000001b40)={0xbc, r4, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3b}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2e}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xe7e31c0d1a24a36d}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xaf718f25}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}]}, 0xbc}, 0x1, 0x0, 0x0, 0x60800}, 0x44000) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x480d0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000080)) [ 1853.006242] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1853.028458] audit: type=1400 audit(1574202114.441:275387): avc: denied { create } for pid=11934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1853.213316] audit: type=1400 audit(1574202114.511:275388): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.355990] audit: type=1400 audit(1574202114.531:275389): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.388132] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1853.509047] selinux_nlmsg_perm: 6 callbacks suppressed [ 1853.509060] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=11957 comm=syz-executor.5 [ 1853.542925] audit: type=1400 audit(1574202114.571:275390): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.571310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=11959 comm=syz-executor.5 [ 1853.673139] audit: type=1400 audit(1574202114.581:275391): avc: denied { map } for pid=11945 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1853.715362] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=11957 comm=syz-executor.5 [ 1853.745591] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=11960 comm=syz-executor.5 22:21:55 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='syz', 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4040000, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0x1f) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r3, 0x2, 0x0) r4 = syz_open_procfs(r3, &(0x7f00000001c0)='net/fib_trie\x00') lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0x8}, 0x28, 0x0) preadv(r4, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:21:56 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000000280)="974f1af837834d90a16e8db779ac6c221a93f757251e000da9384c0701b5b808ce9ba56a6ed3557bd55bde2233a14495b6f65da86492ab3e80d1faf146b948a1a439abbeaf4fc3214c93f13ca15c47efbab48a874a31f2d4118ca0753d0285468272a779a5d43489e4376537e9a5c511c75eeaa7dc98d0363e485785a28dea336354275811b3c170ea9af5cdeb6c0df8f7f7a526f22e6ebaa32eee7517659f74b0bc61a524c517b9531d9543671761a09be3123a5cc04313e88ff718aef52eb197e2da278a55625d9a5d018c75ce", 0xce, 0x7fffffff}, {&(0x7f0000000380)="e9eb3ad7210eabfdbfae064fee3b2f5a6006a6ca9a71c667536203ab25196a86c969916fc4e59c874f83b7f11ccbbf24de1c43f177c5b9f4834a47f4c82a29f03242408ecd8c57139ca269ff3a00e7610ed3df64b003d90804c8f9266bb0c7b321ab0524b5184f6b4555587fce5dfdc4661083034eb42f2d4d3b068f829cb3b5f1046b9cd90c02a7c7ae717dff6f6c08db4cc809907d8f", 0x97, 0x3}], 0x2000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="64656275672c64727561645f6c6f636b2c6465627567402e72615f6973697a653d307c303030303030303030303030303030302c6e6f6d626c6b5f696f5f7375626d75726e61303030303030a1eff82b39b270c030b6a6c28b66d3dfd48acea762dd0400ff3030382c7573726a71756f74613d2c6e6f696e69745f697461626c652c666f776e65723c", @ANYRESDEC, @ANYBLOB=',\x00']) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:hald_cache_t:s0\x00', 0x22, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f00000004c0)="1d5bc624adc016d7f09e79578dfc3cfb234b921ff6e0b248063b3c339b30da82b10094dd92d236e999c3a96e351e66d3bd6e219650ecc1f8e3d8d3c254d19249c8d41a5ca963c885a151e34753d7978327a8e165df2e68d91af2b693524b782663503357bc928f7048db6db08d0b82806811761df612ac65ca6989974275c571c5480b8e27caba0c30f65f9c68e27319de4f4a4d051ee9c7208505704567afbad4c894e378c84451c263811bcedf77174e79e64cbf62b2c11162c90a1281f342343154608d6029", &(0x7f0000000780)="504bcd3ffcdf0290f7a16d1683b4ffd9a706e129af1a490b5e5f8c58ad70c79bc3c21c5158a58eb283837d8d9302419accdbaa86d82e566d36fef7f543541165fb35444e57ec406bab2d47407decc7f6267719b23656a9e9c78767f15eca9d9f17ad3278af8e055bf0d0f1a4d938d425f97a8814e318be9a7213c9a568d18cadfb3a1610f9692902c41f5bb55b42ee0dd27bccb49a29ed1d81b170447de69d36235f8ed5144912526ec52ea4c61699512272c19a0cab25ab90639613a343efe7c1a0579c27e88a44b416", 0x4}, 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getdents(r2, &(0x7f00000005c0)=""/223, 0xfc61) 22:21:56 executing program 5: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0xffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000000700ff3f03000000450001070000001419001a", 0x23}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 1854.422192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1854.493146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1854.559098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1854.632174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1854.685971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1854.721111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11978 comm=syz-executor.5 [ 1855.629439] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1857.341718] kauditd_printk_skb: 337 callbacks suppressed [ 1857.341727] audit: type=1400 audit(1574202119.284:275729): avc: denied { map } for pid=12019 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.369593] audit: type=1400 audit(1574202119.284:275730): avc: denied { map } for pid=12019 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.394707] audit: type=1400 audit(1574202119.284:275731): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.419221] audit: type=1400 audit(1574202119.284:275732): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.446196] audit: type=1400 audit(1574202119.294:275733): avc: denied { map } for pid=12019 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.469204] audit: type=1400 audit(1574202119.294:275734): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.496442] audit: type=1400 audit(1574202119.304:275735): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.521466] audit: type=1400 audit(1574202119.304:275736): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.548290] audit: type=1400 audit(1574202119.304:275737): avc: denied { map } for pid=12019 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1857.572928] audit: type=1400 audit(1574202119.344:275738): avc: denied { map } for pid=12020 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.370896] kauditd_printk_skb: 1019 callbacks suppressed [ 1862.370905] audit: type=1400 audit(1574202124.316:276758): avc: denied { map } for pid=12133 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.400033] audit: type=1400 audit(1574202124.316:276759): avc: denied { map } for pid=12133 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.423087] audit: type=1400 audit(1574202124.316:276760): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.448732] audit: type=1400 audit(1574202124.316:276761): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.473071] audit: type=1400 audit(1574202124.316:276762): avc: denied { map } for pid=12133 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.500620] audit: type=1400 audit(1574202124.316:276763): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.525594] audit: type=1400 audit(1574202124.316:276764): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.555843] audit: type=1400 audit(1574202124.316:276765): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.580984] audit: type=1400 audit(1574202124.346:276766): avc: denied { map } for pid=12133 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1862.610031] audit: type=1400 audit(1574202124.366:276767): avc: denied { map } for pid=12134 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.558558] kauditd_printk_skb: 854 callbacks suppressed [ 1867.558567] audit: type=1400 audit(1574202129.509:277622): avc: denied { map } for pid=12229 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.586466] audit: type=1400 audit(1574202129.509:277623): avc: denied { map } for pid=12229 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.608912] audit: type=1400 audit(1574202129.509:277624): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.633368] audit: type=1400 audit(1574202129.509:277625): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.657732] audit: type=1400 audit(1574202129.509:277626): avc: denied { map } for pid=12229 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.680752] audit: type=1400 audit(1574202129.509:277627): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.705626] audit: type=1400 audit(1574202129.509:277628): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.730483] audit: type=1400 audit(1574202129.509:277629): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.755111] audit: type=1400 audit(1574202129.509:277630): avc: denied { map } for pid=12229 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1867.958316] audit: type=1400 audit(1574202129.909:277631): avc: denied { map } for pid=12230 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b5", 0xe6, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:22:11 executing program 2: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0), 0x3) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7fff, 0xf, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb41, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x54e5ab0516dc59ae, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, r0, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x3}) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) bind(r1, &(0x7f0000000200)=@tipc=@name={0x1e, 0x2, 0x1, {{0x43, 0x1}, 0x4}}, 0x80) request_key(0x0, 0x0, &(0x7f0000000280)='em1vmnet0\x00', 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000300)={0x0, 0xc1}, 0x0, &(0x7f00000003c0)="038c4ad19230b064dbd7bb208fc14f10c97aa74967eb1794044a0af2defb5ad8ecb3a630f1d8f991b32225924d3989288c4d77b8af2e81590511c3789b218c280d57d1b1c1be9edc4e94430ed136d29678bee25db256da383ecec3b28d093f332a08748db7b6b32dcb2ff4d8551367d199248456506bfd44892f3d16043eb29c3ddbf52a9c2af5d04c0c19c92b4201db2aabb8bf0af77e6de6802fab4a530b8ab3572a345db2387a53ff0e626b8dd925317ae92f828fe76abb07ed66ffa9d7eee8", 0x0) 22:22:11 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x12620ba, &(0x7f00000000c0)={[{@journal_dev={'journal_dev'}}]}) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) 22:22:11 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x3, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x7fff) 22:22:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x54) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 22:22:11 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x414000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a280930a06000000a843089100fe80390008000800020000dc13382d0010009b7a136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d240000060c", 0x55}], 0x1}, 0x0) 22:22:11 executing program 1: socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000"], 0x49}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) mkdir(0x0, 0x0) chroot(&(0x7f0000000080)='./file0\x00') creat(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000040)=0x3, 0x4) splice(r4, 0x0, r2, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffffd88) close(r3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x37e7, 0x401}) statx(r6, &(0x7f0000000140)='./file0\x00', 0x6000, 0x12, &(0x7f0000000480)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x20080, 0x0) fcntl$setlease(r7, 0x400, 0x3) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) socket$inet(0x2, 0x3, 0x0) 22:22:11 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x80000, 0x0) setuid(r3) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@loopback, @in=@broadcast, 0x4e21, 0x7, 0x4e23, 0xfffe, 0xa, 0x20, 0x0, 0x80, 0x0, r3}, {0x40, 0x1f, 0xfff, 0x6fe, 0x20, 0x1, 0x1, 0x1}, {0x4, 0x8, 0x80000000, 0xfffffffffffffff9}, 0x8, 0x6e6bbb, 0x2, 0x1, 0x2, 0x1}, {{@in6=@loopback, 0x4d3}, 0xa, @in=@empty, 0x34ff, 0x1, 0x2, 0x8, 0x5, 0x8, 0x9}}, 0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) creat(&(0x7f0000000000)='./file0\x00', 0x20) [ 1869.740669] EXT4-fs (sda1): Cannot specify journal on remount [ 1869.898434] EXT4-fs (sda1): Cannot specify journal on remount 22:22:11 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000040)="587ac0212115a165604520ceb5211b07db55c7ef825242fb914c014a5c6e04e9b71b293ca63cb4a619ed98c3ca666b696e9b3cee53df81a3ed6d5b7ac7cf47173410a4a9dc8f74", 0x47}, {&(0x7f00000000c0)="1559dc1f46fdb7aff4a86aa56387edfb781bc72d3064291f13c6af265f3819a28b579670c0ff1132c8fed07aed42753640588255cb70607658b7ac9fb090d2c6a581eefb7f70c6e2324195e087e1d431fc7333d12fa8a67a895f5ece4ef4990c852b76cbc77279bae53a1d52fa75db88d260ef135436047527edd84a129d7107cde9394395f0c4ae661fe0edee9acbb303141bd3dd6c4f871ee8efb5e9d00e3aedd67d620452edf71a84bd71a7e63347c29afb1edc0605b129863229afebfa2693d321112de7991db3a348e9f257cfef67b5a02254b51617ee3ed1db8a4c0a902aa7ac8ad472870d5cfd41238a2c", 0xee}, {&(0x7f00000001c0)="0c050bb4726d71b2eca08ae7ff8b66f167517563b19af5f7bd01320600a369be8c880cf6996d1ac18d3e1781f205ab1d1eca2ee684f1511b553e508cd68baf2493497052fad7c30d7a4b879dbeec0c6dda4236be", 0x54}], 0x3, &(0x7f0000000300)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x30, 0x0, 0x7, {[@rr={0x7, 0x17, 0x4, [@local, @dev={0xac, 0x14, 0x14, 0x2b}, @remote, @remote, @broadcast]}, @timestamp={0x44, 0x8, 0x6e, 0x1a74d342d8e66578, 0x1, [{[], 0x8}]}, @noop]}}}], 0x48}, 0x4000001) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000095c0)='net/ipv6_route\x00\xe8\xd0\x93\xa3=\xae\n\xb4Q\\\x1a\xe5\x03Wn\x90\x19*$\xa2\xd5\x04f\x9afA\x86\xb9\\\f\xf1k\x03U\xda]\xe9(\xce\b\xab;\xbf,|dU\x82_\x1e;9\xa3\xeb\x7f\xa6\x12\x02v\xcb\x8f\xc9\xaf\x9aD\xfb\x82\xa5J\xdex-\x9f9\x9d\x85\xdb;\xbd@\xc5\x88R\xbe\xd5Dk\xa5\xd7\xb1x(!<\x88:\xa7?>\x0eV%\xa6\x16=7\xf2:\x1bK9\x88\x9fz\xf43Q#\xa5\f\xa8;\x1e\xe9\x0e\xc8\x93\x1f\xca\xc0\xa6#\x85\xf0\xff\xb50\xf5\xd3\xb7\x8a\xb4i\x0f^\xc3\x8d}~\'H\xfaJx\x82_\xb6S\x05\xc6`\xc3\xec\v\x9d\x92\x83\xd1\xecU\x13\xf4\x0e@\x96\x18+{\xb4\x8f\xcc\"\xa2}\x05\v<\x02\xa0\x993\xf2_T\xd7\xbd\xcc\xc8\xcei\xdfG\xa2lg\xd6m\xfa\x04l\xfa\xc12\xae\xbdWs\xa2#\x8d=\t\xaa\b\xab\x94\xe5%\xe5\xe1\xa2$1\xbc\x13\x89#Z') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x140000) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={{r3, r4/1000+10000}, {0x0, 0x7530}}) inotify_add_watch(r2, &(0x7f0000000480)='./file0\x00', 0x8800000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 22:22:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:udev_tbl_t:s0\x00', 0x20, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='\x1f\x1aat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H7\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\xf0\xd5\xfd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x05,+\xe7\xeff', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_INPUT(r2, &(0x7f0000000500)={0x8, "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", 0x1000}, 0x1006) fallocate(r0, 0x0, 0x0, 0x110001) pipe(&(0x7f00000004c0)) 22:22:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b5", 0xe6, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:22:12 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000100)=0x2, 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x2e, &(0x7f00000001c0)=""/152, &(0x7f00000002c0)=0x98) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000300)="08003083a1695e34be931dcfe87b1071") mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) accept4$unix(r2, &(0x7f0000000340)=@abs, &(0x7f0000000280)=0x6e, 0x100000) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x28, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030303030303030b530302c753b601e33"]) 22:22:12 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) add_key(0x0, 0x0, &(0x7f0000002040)='\t', 0x1, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) readv(r2, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000380)=""/96, 0x60}, {&(0x7f00000004c0)=""/25, 0x19}, {0x0}], 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r3 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0xfffffffe, @mcast2, 0x6}, 0x1c) connect$inet6(r3, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x26e, 0x0) r4 = dup(0xffffffffffffffff) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast2}, 0x1a) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x43, &(0x7f0000000280)=0x200, 0x3) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000000)={'sit0\x00', {0x2, 0x4e24, @empty}}) 22:22:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) [ 1870.822793] devpts: called with bogus options 22:22:13 executing program 4: lsetxattr$security_smack_transmute(0x0, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_KEEPCAPS(0x7) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) unshare(0x20020000) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)=0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000340)=ANY=[]) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000003c0)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) 22:22:13 executing program 3: clone(0x8000000, &(0x7f0000000180)="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", &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000002c0)="c28d301746233417279671711e810c88c50d2a97be16a4acea012aaccfb9a42c120521148dd5acf8e520e19bd04a3f610440f41fb83355dadffe5f03c5fa6756ae79d89602592be9dd73db206acd1ca269aea20461419faafc18cee41c1f0f8d182f78faae284832490052eb40ccb5f11daed9aa0d3be7e7eb6be910afdb5a6421f13407ef9df599012a06ac6acd9ecbe5b0") syz_emit_ethernet(0x6a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "4d9841", 0x34, 0x0, 0x0, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@fragment={0x33}], @tipc=@payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) ftruncate(r0, 0x40) fstat(r0, &(0x7f0000000100)) 22:22:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local, 0x5}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r3 = dup2(r1, r2) r4 = socket$nl_route(0x10, 0x3, 0x0) write(r4, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r7 = getpid() fcntl$lock(r5, 0x6, &(0x7f00000001c0)={0x3, 0x3, 0x0, 0x3ff, r7}) ioctl$RTC_SET_TIME(r6, 0x4024700a, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/s\b\x00', 0x200000, 0x0) read$char_usb(r8, 0x0, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) r10 = getegid() ioctl$TUNSETGROUP(r3, 0x400454ce, r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) r11 = syz_open_procfs(r7, &(0x7f0000000500)='net/softnet_stat\x00') io_setup(0x2, &(0x7f0000000080)) preadv(r6, &(0x7f00000017c0), 0x1fe, 0x500) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) splice(r12, 0x0, r13, 0x0, 0x4ffe0, 0x0) bind$inet6(r12, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f0000ad6fad), 0x0, 0x3fffffd, 0x0, 0x0) r14 = creat(0x0, 0x0) r15 = open(0x0, 0x0, 0x0) lseek(r14, 0x0, 0x3) sendfile(r14, r15, &(0x7f0000000040), 0x8000fffffffe) clock_gettime(0x0, &(0x7f0000000100)) write$input_event(r15, &(0x7f0000000140)={{0x77359400}, 0x1f}, 0x18) r16 = socket$inet6(0xa, 0x400000000001, 0x0) close(r16) r17 = open(0x0, 0x141042, 0x0) ftruncate(r17, 0x2007fff) sendfile(r16, r17, 0x0, 0x800000000024) r18 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r18, 0x4, 0x6100) ftruncate(r18, 0x8200) write$cgroup_type(r18, &(0x7f0000000200)='threaded\x00', 0x175d900f) r19 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r19, 0x0) r20 = open(&(0x7f00000009c0)='./bus\x00', 0x143042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r20, 0x0) r21 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r21, 0x0) r22 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r22, 0x0) r23 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r23, 0x0) r24 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r24, 0x0) write$tun(r11, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYRES32=r21, @ANYRES16=0x0, @ANYRES32, @ANYRESOCT=r1, @ANYRES32=r19, @ANYRES32=r4, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRESOCT=r23, @ANYRES32=r24, @ANYPTR, @ANYBLOB="8bc0b4b9709f580cb33db8ba4bfa0b078148adafea410ba421625da41b43142340f85657b6924b074b1ff5e82b39050e8582f4941653a293cc76da5db6dc4b7e26deaa656031e95e3e53942760d9db9e65a7bd07a305447d278a8e0a866ea12a3a96f06cf54c978d9788ee8dab95cc002f0debf248d8df8ae3a4af0934c82abfc53d280454ee5db62ab3d4e7394ad23aff679ff25972baca8faae6455a46aa90ba95cd170cf466c2f97dd97d59bf00a6a74ab85ea082e173a73d0de9a5bf2004dc5879469e8771450e18d38dcdb77cd12e78aba8d317703c264e39ecd719d6193c"]], 0x8) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:22:13 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) fchdir(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x600000, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0xba6, 0x3, 0x1f}) r5 = creat(0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000002c0)) socket$inet6(0xa, 0x400000000001, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) socket$inet6(0xa, 0x0, 0xc9) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NODE_GET(r5, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0xaa353dff9f842f42}, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f0600", 0x16}], 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180)={0x89b, 0x1}, 0xc) exit(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') 22:22:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) r4 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(r6, 0x400454dc, 0x0) write$binfmt_elf64(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="d548b697cdba9c86300020efa50994bed17693bdfa8515d261d38bf309000f007463a7e0786bdb9bda10ad0ef605c8086a8011e7155ba62f5612fb5e393fbbd873780a7786ff6a7a445be615b4baa0229b571f7a3948777c"], 0x1bd) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000740)="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", 0x800}], 0x1) socket$inet6(0xa, 0x80002, 0x0) clock_gettime(0x0, &(0x7f0000000500)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x100) getsockopt(r3, 0x3, 0x1000, &(0x7f0000000640)=""/229, &(0x7f00000000c0)=0xe5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x9) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r8 = socket(0x2, 0x803, 0xff) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) sendfile(r8, r7, 0x0, 0x72439a6b) 22:22:13 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'\x94yz'}, &(0x7f0000000200), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x1ee6b, 0x0, 0x2, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x1}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffc}, 0x0, 0xf, r1, 0x1) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x11, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x0, &(0x7f0000000000)="b597dd1b90087187aaf21096652dc4dffdc84d5cdb09449fe3184ad6867a5cf796688d645046ab024d74b955ae2d59290df52e81549c691d9d300b44ee0c3dcb245bc45034cce63bc00af18f82", 0x4d) ioctl$int_in(r4, 0x0, &(0x7f0000000080)) io_setup(0xe177, &(0x7f0000000200)=0x0) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r6, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r6, 0x1) io_submit(r5, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9, r6, &(0x7f0000000240)="52f46fd08d06a95ddd87", 0xa, 0x3}]) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'sit0\x00'}) setsockopt$packet_int(r7, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x200840, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r9, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r9, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r9, 0x1) r10 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) bind$packet(r8, &(0x7f0000000300)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r7, &(0x7f0000000d00), 0x400004e, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r12, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r12, &(0x7f0000000300)={0x11, 0x0, r13, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r12, &(0x7f0000000d00), 0x400004e, 0x0) connect$inet6(r12, &(0x7f0000003a40)={0xa, 0x6e24, 0xfffffffc, @remote}, 0xe98948e3e13e4fc5) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) setsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x10001, 0x1, 0xfd, 0x0, 0x4}, 0x0) 22:22:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES32], 0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000100)) write$UHID_INPUT(0xffffffffffffffff, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000280)={0x5, 0x73, 0x0, {{}, 0x9}}, 0x18) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r0, 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xfffe) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\x0f\xb6t\xd1|(\x01\x00\x00\x80') setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) [ 1872.623954] kauditd_printk_skb: 332 callbacks suppressed [ 1872.623963] audit: type=1400 audit(1574202134.561:277964): avc: denied { map } for pid=12342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x87f1a7) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x2}) [ 1872.832035] audit: type=1400 audit(1574202134.611:277965): avc: denied { map } for pid=12341 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1872.989285] audit: type=1400 audit(1574202134.611:277966): avc: denied { map } for pid=12342 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1873.203309] audit: type=1400 audit(1574202134.621:277967): avc: denied { prog_load } for pid=12334 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1873.312362] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1873.317233] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1873.319896] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1873.348798] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1873.374368] audit: audit_lost=1258 audit_rate_limit=0 audit_backlog_limit=64 [ 1873.376766] audit: audit_lost=1259 audit_rate_limit=0 audit_backlog_limit=64 22:22:15 executing program 5: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) r4 = fcntl$dupfd(0xffffffffffffffff, 0x4e5971bf56ad36a4, 0xffffffffffffffff) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000080)=0x711212a5) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r5, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r5, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001d00070f00000000010000000700c3ea", @ANYRESOCT=r5, @ANYBLOB="3c0000930a0002"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x1) 22:22:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, 0x0, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) ptrace$getregs(0xe, r4, 0x9, &(0x7f00000001c0)=""/53) bind$packet(r2, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) recvfrom$unix(r2, &(0x7f0000000000)=""/94, 0x5e, 0x80000002, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) futex(&(0x7f000000cffc), 0x81, 0x2, 0x0, 0x0, 0x0) 22:22:16 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2058a000180c200000008004500001c000000000000907800000000e0000001000000000008907858f4982330beb25f2243095bcdb46c93f31ab41b010095236bb39efb4d387d80bab6803030fee8ca0dedb9f1ec7333d6bd0a700534d17051e2357bcb6cb64542fda7133a5b4fc06fa94fe920b6ef9c89117ca0060df0c51e71f827c32b1161db30f0a50c0a2ecc2d546aff645bbe460f78b47f317224b2031b0ab2533948b58bf9be00be0ef3b26ce10afef9ad4f43a0d8bde69343b9f26836f15b88227f1dd2c02af282a8d5d11918d1d5"], 0x0) [ 1877.644027] kauditd_printk_skb: 310 callbacks suppressed [ 1877.644036] audit: type=1400 audit(1574202139.594:278272): avc: denied { map } for pid=12421 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.672164] audit: type=1400 audit(1574202139.594:278273): avc: denied { map } for pid=12421 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.695064] audit: type=1400 audit(1574202139.594:278274): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.720627] audit: type=1400 audit(1574202139.594:278275): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.748490] audit: type=1400 audit(1574202139.604:278276): avc: denied { map } for pid=12421 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.772079] audit: type=1400 audit(1574202139.614:278277): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.800558] audit: type=1400 audit(1574202139.614:278278): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.825552] audit: type=1400 audit(1574202139.614:278279): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.854498] audit: type=1400 audit(1574202139.624:278280): avc: denied { map } for pid=12421 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1877.879251] audit: type=1400 audit(1574202139.664:278281): avc: denied { map } for pid=12422 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.652396] kauditd_printk_skb: 1008 callbacks suppressed [ 1882.652406] audit: type=1400 audit(1574202144.606:279290): avc: denied { map } for pid=12533 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.682568] audit: type=1400 audit(1574202144.606:279291): avc: denied { map } for pid=12533 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.709965] audit: type=1400 audit(1574202144.646:279292): avc: denied { map } for pid=12534 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.732416] audit: type=1400 audit(1574202144.646:279293): avc: denied { map } for pid=12534 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.758401] audit: type=1400 audit(1574202144.646:279294): avc: denied { map } for pid=12534 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.782919] audit: type=1400 audit(1574202144.656:279295): avc: denied { map } for pid=12534 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.811206] audit: type=1400 audit(1574202144.656:279296): avc: denied { map } for pid=12534 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.834340] audit: type=1400 audit(1574202144.666:279297): avc: denied { map } for pid=12534 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.862902] audit: type=1400 audit(1574202144.666:279298): avc: denied { map } for pid=12534 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1882.887895] audit: type=1400 audit(1574202144.676:279299): avc: denied { map } for pid=12534 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.177843] kauditd_printk_skb: 919 callbacks suppressed [ 1888.177849] audit: type=1400 audit(1574202150.139:280219): avc: denied { map } for pid=12637 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.205931] audit: type=1400 audit(1574202150.149:280220): avc: denied { map } for pid=12637 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.231986] audit: type=1400 audit(1574202150.149:280221): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.256814] audit: type=1400 audit(1574202150.149:280222): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.283579] audit: type=1400 audit(1574202150.159:280223): avc: denied { map } for pid=12637 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.306508] audit: type=1400 audit(1574202150.159:280224): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.333461] audit: type=1400 audit(1574202150.169:280225): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.358369] audit: type=1400 audit(1574202150.169:280226): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.385010] audit: type=1400 audit(1574202150.169:280227): avc: denied { map } for pid=12637 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1888.598683] audit: type=1400 audit(1574202150.559:280228): avc: denied { map } for pid=12638 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:22:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001080), 0x4) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80204441}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9ccbafa290cabc2aae27d2b0277e23288171d2d74cf0e2bbe59e0809964757705d75e9749a8b6ecc30de1ea6ae1c62b6a68c19ee544027ec6b1d94fe134045fed16e47b14ee562153a75436724c9287d610d60a74889b3980202280bc94948b3352b3266a0794b663ede63d5b42bd4adbbd7d1", @ANYRES16=r3, @ANYBLOB="000225bd7000fddbdf250300000018000200080001000700000008000100cd0800000400040040000700080002000300000008000100ff0f000008000100008000000c000400ff7f0000000000000c000400ff030000000000000c0003000100008000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x6010040) close(r0) 22:22:31 executing program 5: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r0, &(0x7f0000000300)='\x00', 0x1) fcntl$addseals(r0, 0x409, 0xd) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0xa0000) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r4, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r4, 0x1) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000000)={0x9, 0x7fff, 0x1000, 0x4}) 22:22:31 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000680)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x7, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) ioctl$RTC_PIE_ON(r2, 0x7005) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:22:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x12) fadvise64(0xffffffffffffffff, 0xfffffffffffffff8, 0x4000000001f, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000400)={0x0}) 22:22:31 executing program 4: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x101000, 0x0) fcntl$setflags(r2, 0x2, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r3, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9c4b64ad7d1a7b2e88b140212813000000", @ANYRES16=r5, @ANYBLOB="020860000000ffdbdf25020000000c00060008000100020000000c0006000800010000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4284b) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 1889.871479] [ 1889.873390] ============================= [ 1889.877544] WARNING: suspicious RCU usage [ 1889.881794] 4.14.154+ #0 Not tainted [ 1889.885512] ----------------------------- [ 1889.889930] include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage! [ 1889.897813] [ 1889.897813] other info that might help us debug this: [ 1889.897813] [ 1889.905971] [ 1889.905971] rcu_scheduler_active = 2, debug_locks = 1 [ 1889.912646] 2 locks held by syz-executor.5/12683: [ 1889.917492] #0: (&sb->s_type->i_mutex_key#10){+.+.}, at: [<00000000c6240844>] shmem_add_seals+0x12b/0xf80 [ 1889.927440] #1: (&(&mapping->tree_lock)->rlock){-.-.}, at: [<00000000d99ad7ab>] shmem_add_seals+0x2e1/0xf80 [ 1889.937546] [ 1889.937546] stack backtrace: [ 1889.942059] CPU: 0 PID: 12683 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1889.949515] Call Trace: [ 1889.952117] dump_stack+0xe5/0x154 [ 1889.955685] shmem_add_seals+0x9d2/0xf80 [ 1889.959784] ? shmem_file_llseek+0x220/0x220 [ 1889.964221] shmem_fcntl+0xea/0x120 [ 1889.967858] do_fcntl+0x5c8/0xd20 [ 1889.971323] ? f_getown+0xa0/0xa0 [ 1889.974793] ? __fget+0x237/0x370 [ 1889.978260] ? selinux_file_fcntl+0x86/0x140 [ 1889.982690] SyS_fcntl+0xc6/0x100 [ 1889.986152] ? do_fcntl+0xd20/0xd20 [ 1889.990058] do_syscall_64+0x19b/0x520 [ 1889.993974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1889.999173] RIP: 0033:0x45a639 [ 1890.002366] RSP: 002b:00007fb93e8eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1890.010099] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 1890.017464] RDX: 000000000000000d RSI: 0000000000000409 RDI: 0000000000000003 [ 1890.024751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1890.032061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb93e8eb6d4 [ 1890.039351] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff 22:22:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) io_setup(0x3, &(0x7f0000002c80)=0x0) r2 = creat(&(0x7f00000025c0)='./file0\x00', 0x0) eventfd(0x100) r3 = creat(&(0x7f00000025c0)='./file0\x00', 0x0) io_submit(r1, 0x1, &(0x7f00000002c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x5, r2, &(0x7f0000000880)="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", 0xffffffffffffff0b, 0x0, 0x0, 0x4, r3}]) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000003c0)={0xffffffffffffffe0, 0x5, 0x98}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000004c0)=0xc) socket$netlink(0x10, 0x3, 0x7) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x2b) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="f009f5eebe008bedfaacdb3d93cb92aac42ccc9ad3f2c831dddc8da3b57d2676ee828c2bad1360eb1fb38317a100000000"], 0x4) perf_event_open(&(0x7f0000001ec0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0xcc0, 0x0, 0x1, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setreuid(0x0, 0xee00) geteuid() request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='sT\x01', 0x0) 22:22:32 executing program 1: open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r1, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) r4 = accept$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000140)=0x1c) splice(r0, &(0x7f00000000c0)=0x42, r4, &(0x7f0000000180)=0x5, 0x7, 0x0) fcntl$setstatus(r0, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x2, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f0000000000)) 22:22:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='auto_da_alloc=0x0000000000007fff,dont_measure,\x00'/68]) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:22:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20200, 0x0) write(r3, &(0x7f0000000180)="d265ceda6e45e6b7a148f2af166798610190f8431c7869597705d70ad1ef476a6d3b2d54d089f7a71365d41cf3d78d28df90ed976d113e5536d4e5b61191df914051e457dff240bcf0d9dbc6bc9eebcb0e0ba8fe6dc0250e2fa4c92d5130aac587e4475c55944bfcb3c69c98b56cb749de32d651e6e367d2b187b7c183d1aca4c3c6db7c54f220c82bd953cbe17265f6140727d5264bc95fb9e8d06bbeb2618b74e45c868cb2e410e33368bd8b33c5b5cb3859b51be872b82a2bb0f0332215225f1ffa1389af84569cc347814f8b59b7e50a77ff45c7620a5437b91afdb6b0d73803e0aaea3ac234931ad6da8b618a0f078b", 0xf2) ftruncate(r2, 0x200006) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fadvise64(r2, 0x0, 0x0, 0x1) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x8000fffffffe) 22:22:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x1) add_key$user(&(0x7f0000000040)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x40) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs={0x3, 0x0, 0x4e21}, 0x6e) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x5, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="88c5e2e55b16546ba975198db85068e9453561c57c55665f13e504ae0b78c8c2f4155ee1a5f5093ae9b84d1c72977965c7be8ba23536000006e01e9c4a6bbfa898c6fc043a0f01fa357518faf84ef7c0c42977f2912325bd4ea2a28bed8a1814333aa433b15ae5ce051407fef3e8da825f41211f48fb9c1528b69698a772067088f4474f0ff87e64f49798d5f509af969d70b62229870ffab68c5c95a974d24ef545cd01e068a1f96f99fa8b631e5ee82221035a8d35cfa3d6d4960a84f8690874227040de6e31ef4cbae196e01bb026d663a94ecf736ae935bfda506c2a38c28165939173b541", 0xe7, 0x2}, {&(0x7f00000002c0)="9278e34c8e777728739f551ca1b18bccffd330afb496a24d1e4590e8cb8f4609e062c6f7b1b4cc9f5d8155908054cea791e8806d115b2ae4631c277eeb4e7676ab849e506bb8e1553a438db6e5bd3da3f1264f6eaf0b7332431a2565bc83c2be2699c46ad943", 0x66, 0x4}, {&(0x7f0000000340)}, {&(0x7f0000000480)="69d4516ddcf22a92a5ade119c87e915cd5747e7de2184a3d02e1b3cbf45982f49861357200df9b3f1bc527ce1d3b189953", 0x31, 0x401}], 0x0, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.evm\x00', &(0x7f0000000680)=@sha1={0x1, "6c82964ba6d01fc9ae7d3710f56c37bd52d01255"}, 0x15, 0x1) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) 22:22:33 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r0, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket$inet(0x2, 0x2, 0x7f) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in=@loopback, 0x4e20, 0x948a, 0x4e23, 0x0, 0x2, 0xd05cd19066e2f45f, 0x80, 0x2b, 0x0, 0xee01}, {0x4, 0x5, 0x8, 0x6, 0x7000000000, 0x4, 0x2, 0xa0d}, {0x1, 0xffffffff80000001, 0xffffffffffffffff, 0x800}, 0x8, 0x6e6bb8, 0x2, 0x1, 0x1, 0x1}, {{@in6=@loopback, 0x4d2, 0x2b}, 0x8, @in6=@rand_addr="7caff05ab5c010bac1974668a8c23703", 0x3503, 0x0, 0x3, 0x81, 0x5, 0x2, 0xc0000000}}, 0xe8) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) shutdown(r0, 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) 22:22:33 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='.\x06\x00\x00\x00\x00\x00\x00\x00syz1\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) readv(r2, &(0x7f00000002c0), 0x0) [ 1893.243850] kauditd_printk_skb: 358 callbacks suppressed [ 1893.243859] audit: type=1400 audit(1574202155.202:280587): avc: denied { map } for pid=12733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.323521] audit: type=1400 audit(1574202155.202:280588): avc: denied { map } for pid=12733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.397917] audit: type=1400 audit(1574202155.202:280589): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.476821] audit: type=1400 audit(1574202155.202:280590): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.542891] audit: type=1400 audit(1574202155.232:280591): avc: denied { map } for pid=12733 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.565962] audit: type=1400 audit(1574202155.242:280592): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:35 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00bk', @ANYRES16=r6, @ANYBLOB="08002dbd7000ffdbdf250a000000440007000800020009000000080001008100000008000100058afd340c000300030000000000000008000100040000000c000300ff0000000000000008000100ffffffff"], 0x58}, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(r3, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r7 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xfffffff4) socket$inet6(0xa, 0x800, 0x3f) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) time(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 22:22:35 executing program 3: add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) tkill(r3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0x0) socket$inet(0x10, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x0, 0x0, 0xffffffffffffff49) 22:22:35 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x381000, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800006, 0x2012, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, r5, 0x0, 0x1, &(0x7f0000000180)='\x00'}, 0x30) get_robust_list(r6, &(0x7f0000000340)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, &(0x7f0000000380)=0x18) r7 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x1000f4) write(r2, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000440)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x2) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r8, &(0x7f00000000c0)='./file0\x00') mkdirat(r8, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) r9 = socket(0x11, 0x800000003, 0x81) bind(r9, &(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x1, {{0x3, 0x4}, 0x403}}, 0x80) write$binfmt_aout(r9, &(0x7f0000007540)=ANY=[@ANYBLOB='\x00'/14], 0xe) bind(0xffffffffffffffff, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 22:22:35 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='ip6tnl\x00') lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x8, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x40}}, 0x0) [ 1893.673111] audit: type=1400 audit(1574202155.242:280593): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.755395] audit: type=1400 audit(1574202155.262:280594): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:35 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x2, 0x0, 0x4000000000000000, 0x43100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0xae}, 0x0, 0x0, r0, 0x10) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000100)="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", 0xfc) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{0x0, 0x5, 0x6, 0x7}, {0x7f, 0x2, 0x8, 0x400}, {0xfff, 0x2, 0x7, 0x9}, {0xf800, 0x40, 0x40, 0x4c0}, {0x4d, 0x8, 0x39, 0x2}]}) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) fsetxattr$security_evm(r1, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@sha1={0x1, "6085d564c975c4029cc06a8ecbace0197a4a80c9"}, 0x15, 0x1) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) fcntl$setlease(r2, 0x400, 0x7) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) creat(0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1893.819662] audit: type=1400 audit(1574202155.262:280595): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1893.939907] audit: type=1400 audit(1574202155.282:280596): avc: denied { map } for pid=12733 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 22:22:35 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) read$char_usb(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000000c0)=0xfffffec5) socket$unix(0x1, 0x5, 0x0) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r3, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r3, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000300)={0x3, 0xa4, "0a83caae754c04cd92721368d2794a2dfc3051be412d4373a38f588d307c3979497a9568cb7393bbdedf5cc53f9c9d0fad309ef7e0738977940a928a6a1ed8d3a586961ed4e4aee7d2261a0b205838e0111db442b549b30fecd57db0ad4d72319fcf816876dd5bfc27fede5ad160da539312a55862be95f62e58c932bfcd616973aa81610b9ea4dc0e5f9d76c745916abbf4cbfa66fabbea9e0a31052ba30e3f69aa1ae2"}) getgid() setregid(0x0, 0x0) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r4) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f0000000a00), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x0, 0x0, 0x10000000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 22:22:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000340)='./file0\x00', 0x8, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x90080, 0x0) write$input_event(r1, &(0x7f0000000100)={{}, 0x12, 0x1, 0x10000}, 0x18) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='bic\x00', 0x4) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000340), 0x4) write(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x9) sendto$inet(r2, 0x0, 0x174, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) shutdown(r2, 0x1) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x422000a7b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000380)={{r4, r5/1000+30000}, 0x17, 0x7, 0x8}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x80440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x10001}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clock_gettime(0x0, &(0x7f00000003c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 22:22:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x800, 0x10000000, 0x8, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000c10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) ftruncate(r2, 0x800) lseek(r2, 0x4200, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="0d00000007000000000000000033a046000090c97187cbb6f4149c15d3c1d2ece86d08436934e99d0a2af46b72a16c7e2c13ac5079b6"], 0xd) r3 = creat(0x0, 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="0d000000078e33b542"], 0x9) sendfile(0xffffffffffffffff, r4, 0x0, 0x9c49) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) uname(&(0x7f0000000040)=""/12) syz_open_procfs(0x0, &(0x7f00000006c0)='net/fib_triestat\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(r1, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x85, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[], 0x3}}, 0x0) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) write$P9_RLERRORu(r5, &(0x7f0000000000)={0xd}, 0xd) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000200}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x8, 0x13, @l2={'ib', 0x3a, '\x00'}}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8820}, 0x10) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_generic(0x10, 0x3, 0x10) geteuid() geteuid() eventfd2(0x3f, 0x80000) 22:22:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000500)=""/165) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000680)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz1\x00', {}, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) close(r1) [ 1898.268264] kauditd_printk_skb: 354 callbacks suppressed [ 1898.268273] audit: type=1400 audit(1574202160.224:280951): avc: denied { map } for pid=12807 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.296240] audit: type=1400 audit(1574202160.224:280952): avc: denied { map } for pid=12807 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.319530] audit: type=1400 audit(1574202160.234:280953): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.343931] audit: type=1400 audit(1574202160.234:280954): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.368348] audit: type=1400 audit(1574202160.244:280955): avc: denied { map } for pid=12807 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.391416] audit: type=1400 audit(1574202160.244:280956): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.416313] audit: type=1400 audit(1574202160.244:280957): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.442106] audit: type=1400 audit(1574202160.254:280958): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.467202] audit: type=1400 audit(1574202160.254:280959): avc: denied { map } for pid=12807 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1898.491834] audit: type=1400 audit(1574202160.294:280960): avc: denied { map } for pid=12808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1