\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x5, 0x4) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 03:41:33 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:33 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:33 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800000000001, 0x253a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x40000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x40) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000180)={@rand_addr=0x7, @remote, @local}, 0xc) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) [ 728.360127] audit: type=1400 audit(2000000493.060:51437): avc: denied { map } for pid=22861 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001480)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x201040, 0x0) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) setfsuid(r2) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x4040) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="871d3519480a9d5fa1d7a9850854ce02fecadec48fc247af1576f0ab2d42d36fc59efab7df9b6537b2d7ebe33d3c6821a7ccf2c31a01b63c368f6e2cb47c7256eec8fcbedb16dfe53793413a018d0183060c3dcba80ab43f5d918cb48e242604d1084cc04728127cfe3ad722ea9a0cc56951ce124d17b100cdf694096a5da18fabaf612aa642de6e70cb02c26f1aad5bf5f158fe65d8edf5bb6c77fe35f90776527dea8bc638cc3cabd26cdf988ef3afa1cc09c99c0ed6e9351042442a2a5f6586ca09b5d6f5b4ef04ef33e51b14bdc47718d01bc43940dffe14efb540e232e215f542cc6e0000"], 0x1) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r3, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r3) keyctl$KEYCTL_PKEY_QUERY(0x18, r3, 0x0, &(0x7f0000000240)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', &(0x7f00000002c0)) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) [ 728.479181] audit: type=1400 audit(2000000493.060:51438): avc: denied { map } for pid=22861 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.590140] audit: type=1400 audit(2000000493.070:51439): avc: denied { map } for pid=22861 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:33 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 728.740533] audit: type=1400 audit(2000000493.080:51440): avc: denied { map } for pid=22861 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.857860] audit: type=1400 audit(2000000493.090:51441): avc: denied { map } for pid=22861 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4b33414b70050b0a}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r3, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) r5 = creat(0x0, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_RX_RING(r5, 0x10e, 0x6, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) getresuid(&(0x7f0000002bc0)=0x0, &(0x7f0000002c00), &(0x7f0000002c40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1cf987daca00"/23, @ANYRES32, @ANYRES32, @ANYRES32], 0x1c}, 0x0) fchown(0xffffffffffffffff, r6, r4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) fcntl$getown(r7, 0x9) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r8, 0x2) shutdown(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000040)=""/99, &(0x7f00000000c0)=0x63) recvmmsg(r0, 0x0, 0x0, 0x2, &(0x7f0000004e40)) 03:41:34 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:35 executing program 0: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:35 executing program 3: r0 = open(0x0, 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="fe4f82c93f6e74c911305bad12b472bf92dd503cee5483a897e20b2c42fb0698d1cacef18d3e7f760a22d26d12d2f71d6407c171014e6e760dc3c01eb11c10f36845ac23e9e1b607c5e1476e9d78f8649eb77ccf8b8cd379ba7abb8aaa9f20772ce133b2e42190a7be390a9171a7d53bc4c3363b2785637c9f3e04081816d6e356b853f0959cafcbd2b8c9a460f942416f740a484f280b5096c75fea38960d806f9dd10f332e7da09ec09ced018c0bd49a03198dbe370f993ce6c56101bd0c", 0xbf}, {0x0}, {&(0x7f0000000080)="cd92a473", 0x4}], 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="600000000000000000000000a80600008ce7a5de694b82b5ea6cd76341679c884b273f181001ae057d5fb9ff2f3f148b7a1516c0a7cbcfde672cbe2bd383a47ede7746156f48c97876f405764f862e6fcc0060000000000000000f010000070000008d7308ec8d554e352aed41c3b0e67d161fb3fe7f144e34500b332616a97e146c7978b8de45cac8e5f34ca3dee9bcc2000b95b42221e935226a4b5b7f58e83a290765e116f75d375fead4375564a0cc00"], 0xc0}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x1) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000380)) setreuid(0x0, r3) pread64(r1, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r2, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40c80002}, 0xc, &(0x7f00000005c0)={&(0x7f0000000740)={0x1fc, r6, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xba6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_LINK={0x134, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc63}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x898}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff65}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1e}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffdaac}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4b13}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x4000}, 0xd9f8a365c0cc218a) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000003c0)=""/98) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000700)={'hsr0\x00', 0x1000}) 03:41:35 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:36 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:36 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:36 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2, 0x14, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x6}, 0x0) 03:41:37 executing program 0: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000001a00d17da53a7436fef7001d0a0b49ffed000000800028000800030001000000", 0x24) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ftruncate(r2, 0x7) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000140)={&(0x7f0000000080)="0c9fbbdc24948124729b669860478b0f480ed625660591dc65181b52a8409a684333b463da9b0a54c2972359d4ff2ff707eda80ed20aa4a6c859636837019b82caeb3933498d77f1fc2b165593e0aeff21acb42b1dcca427b8bcd94aac7a30af41f39ac1e811ebfebf8a51b440bcd88af39175bdef681fca272584d24702fb5979ab65a9d6ce51886f4f8b76799dec032f73466d3a2c318f9e5ee193aa9b13", 0x9f}) 03:41:37 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 733.126144] kauditd_printk_skb: 310 callbacks suppressed [ 733.126154] audit: type=1400 audit(2000000498.040:51752): avc: denied { map } for pid=22963 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.211149] audit: type=1400 audit(2000000498.070:51753): avc: denied { map } for pid=22963 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.275400] audit: type=1400 audit(2000000498.120:51755): avc: denied { map } for pid=22963 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.355997] audit: type=1400 audit(2000000498.100:51754): avc: denied { read } for pid=22915 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 733.422902] audit: type=1400 audit(2000000498.120:51756): avc: denied { map } for pid=22963 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000400)=0xfffffffffffffff7, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @rand_addr=0x2}, 0x1f2, 0x0, 0x0, 0x0, 0xf2d, &(0x7f0000000040)='veth0_to_bridge\x00', 0x3f, 0x7, 0x8}) 03:41:38 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffe8c, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0100000008000000140014007465616d01040000000000000000000008001b0000000000"], 0x3c}}, 0x0) 03:41:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_open_procfs(0x0, &(0x7f0000272000)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) [ 733.537608] audit: type=1400 audit(2000000498.230:51757): avc: denied { map } for pid=22966 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.633280] audit: type=1400 audit(2000000498.250:51758): avc: denied { map } for pid=22966 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.713079] audit: type=1400 audit(2000000498.250:51759): avc: denied { map } for pid=22966 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:38 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e24, 0x6a, @dev={0xfe, 0x80, [], 0xb}, 0x200}, {0xa, 0x4e21, 0x3d84, @remote}, 0x5, [0xd03, 0x7, 0x7, 0x9, 0x5bb, 0x800, 0x1f, 0x7]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x29) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000180)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) [ 733.860685] audit: type=1400 audit(2000000498.260:51760): avc: denied { map } for pid=22966 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.980125] audit: type=1400 audit(2000000498.270:51761): avc: denied { map } for pid=22966 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:39 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:39 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@multicast1, @empty}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002200000070700000ee60000bf050000000000001f650000000000006507000002000000270700004c00e6001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000090bcd9c2a8bd55c309770cf35f1d06b229745bbefff9ccc206cfbc4f91febb64b23e"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 03:41:39 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:39 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aeee41c4301889c91ff7f000000001600aa20475d9f82d3869feeed860e6cb504000000cad7cb69010046b653e1010000000000000041374611f5a933f7783b57ed903fda95cb71e3035a0db90bcbd920c1e049430eec66c7b01ffb60c99b4f06cd57fdda08f470d67cc54a56e54f3fb886d1597110ff960b268513ff2a86cca78a53aef3ab90d1b694e88394f393896d1da2fbd877a78c481a8535a11503331f75d12a95836af9be6a2ee32d9b45bd06eba195dbf06ffb28e088468634af89dcb183c6571aeb90765380610715fa9ecff4a96716b0904f5a"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x1000)=nil) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000040)=""/138, 0x8a}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/90, 0x38}, {&(0x7f0000000100)=""/3, 0x16d}], 0x4, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@volatile={0x9}, @struct={0xe, 0x3, 0x0, 0x4, 0x0, 0xcd0, [{0x1, 0x4, 0x5}, {0x3, 0x1, 0x8a}, {0x3, 0x1, 0x7}]}]}, {0x0, [0x0]}}, &(0x7f00000005c0)=""/69, 0x57, 0x45}, 0x20) 03:41:40 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x48000, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe2(0x0, 0x800) r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)={0x0, 0x0, 0x1ff, 0xb3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) write$evdev(0xffffffffffffffff, &(0x7f00000004c0), 0xfffffffffffffff7) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x0, 0x3}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x154) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000000, 0xaaaaaaaaaaaac80, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000300), 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)) r2 = socket$inet(0x2, 0x6, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f00000002c0)={0x6, &(0x7f0000000540)=[{0x8, 0x6, 0x8, 0xd246}, {0x8, 0x5, 0x7, 0x1}, {0xffff, 0x40, 0x9a, 0x6f}, {0x7fff, 0x3, 0x3f, 0x6}, {0x8, 0x81, 0x4, 0xec4}, {0x5e00, 0x9, 0x81}]}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, 0x0, 0xffffffb0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/89, 0x59, 0x10021, &(0x7f0000000040)={0xa, 0x4e24, 0x100, @dev={0xfe, 0x80, [], 0x1e}, 0x79}, 0x1c) socket$inet(0x2, 0x0, 0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) ptrace$getregs(0xe, 0x0, 0xfced, &(0x7f0000000640)=""/216) creat(0x0, 0x0) unshare(0x400) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) 03:41:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000004c0)={0x2e, @remote, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x2f}, 0x2c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000380)={0x4, 0x2, 0x6, 0x80, 0x3, 0x2}) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e23, 0x5, @mcast1, 0x80000000}}, 0x0, 0x1, 0x0, "a35e369a28321c89052f5dd277015e7fd1c9fd0278ea92bb0b7bd006000000ea9191461e82dee963be2bb8f13137a80365a0a6aa50f9a6e3ab95a95f294260adb449c58e00"}, 0xd8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) sched_getaffinity(r3, 0x8, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') clock_gettime(0x0, &(0x7f0000000240)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000440)={'NETMAP\x00'}, &(0x7f0000000480)=0x1e) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200)={r6, r7+30000000}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r9, 0x6609, 0x0) ioctl$BLKALIGNOFF(r9, 0x127a, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) write$cgroup_subtree(r8, 0x0, 0x0) fallocate(r8, 0x10, 0x0, 0x10001) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:41:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000014001600100001000c0003000000000000000000"], 0x3c}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000000)) 03:41:40 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:40 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 735.958559] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 03:41:41 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = getegid() setresgid(0x0, 0x0, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 736.049359] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 03:41:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xf420) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@usrquota='usrquota'}, {@usrjquota='usrjquota=', 0x22}]}) 03:41:42 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141045, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='#'], 0x1) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x2, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=@newqdisc={0x28, 0x5e, 0x7, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x9}}}, 0x28}}, 0x0) 03:41:42 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) getegid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'b\x14\x90\x10_slA\x97\xdc\x8f\x00\x00\x00\x00 ', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'3-\x00', 0x400}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) creat(&(0x7f0000000240)='./file0\x00', 0x4) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) r8 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001000010800000000000000000000000091a2d41c0c0bbb46f9782133dd0fe05e56fc416a092ff7816d3ee5961ab06a33652b39a9ee11e497c77b04598d83ed73f29aebb63b2589e9c5e20e9438a8755668935eb4079322f8f8177b9fe66a902d96764ef07dd82b4cd175d2ca00363a3e7a1a7c54df098cac65228f2d7cbc84f5331b8bc5c64b94ee87da273078ca1a561b9613b95b1297d9f367089abf5befa90a315a95d762df3d25aecaf2bf91c02144a534e119058f8e0821e54d1abe80ee72cb991d0f40edcd58a0453f55fb9a9f8b6f17c73de5e55ba191061e0fddd3fd901fe467cb5b6724482c5fd7", @ANYRES32=0x0, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYBLOB="d4501db96cf1b976b5ca9f758160730f26f4e5f1e6881d701ee110971fc18b2cf678c60adb36f28ee1a22df4233eda283bb47d761d1ee094dca05a2bf52ba0808554c6028f62c6a1353d42cd910be6866db82e6e20192387ac4c5f0f0a4fbc41d99b53839d55c26c254cd3b98c14d5a2a11420f83ecebd512febb8fd5be5f4295933003c2a16df9c9069af2fb2fec7f8a214e2bb0c4accd72a5d0e16ecd4fda9e0ff2787a629e11bc53f32b65375b50600bda50b7c28ffe802798e2ba579e87f898ba22141726a3af51cf41a3c652045a85bfae89c7c0432c6a13f8d2e5d2489dc262a592e81a5e7", @ANYPTR, @ANYRESDEC, @ANYBLOB="d9f87ac47d44e54596ba47a552dd274cac0c228bbd2093b90e8d2ed415f5e6e8aeaac103cd2e5f92e3d748c965b9e724cb86c5d33545215b35659f596a53b0709ae26e162c1ea7c26acf8c2b3547a534fdf41e50f8aab2e8b7b0c044e14ea1a31b5ddb79d3991312b42c32b0ce8faaf2285adb09bc965cdc52949961164b2f1dc0f3db99de1a610a96ab1e0cd4b75b606cda01892a565f1d95718857ed42252a", @ANYRESOCT, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB="0b19a952cd355bed1057d9fb3249c5bb7d96b7a6fbeb521ecebdfcf4da295580c5cfb5524d5e11f72a63cc29d6d1479d4fb9004b5cb64ade5f763755d5ced5b71011ec8da69edfdea378ccae6763183f10ee528e442a239bd64450ccdd7a51d56f4a54a0bdd524f2663316b26a", @ANYRES32, @ANYRES16=r8, @ANYPTR64], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR64, @ANYRES16=r3, @ANYRESOCT=r4, @ANYPTR, @ANYRESOCT=r7, @ANYRESOCT=r5], @ANYRES64, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRES32=r6, @ANYRES32], @ANYRESDEC=r1]], 0x3}}, 0x0) [ 737.731489] EXT4-fs (loop0): journaled quota format not specified 03:41:42 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) getegid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180), 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r2, r3) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e22, @multicast1}, {0x78f, @local}, 0x60, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, 'veth0\x00'}) sendmmsg(r3, &(0x7f00000054c0)=[{{&(0x7f0000000080)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000100)}}, {{0x0, 0x0, &(0x7f0000001980)=[{0x0}, {0x0}], 0x2}}, {{&(0x7f0000002b00)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-sse2\x00'}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000000200)}, {&(0x7f0000002c00)="17f4c95fad6d20abbccfe9f0", 0xc}, {0x0}, {&(0x7f0000002d40)="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", 0x36a}, {0x0}], 0x5, &(0x7f0000005580)=ANY=[]}}], 0x3, 0x0) [ 737.912007] EXT4-fs (loop0): journaled quota format not specified [ 738.188108] kauditd_printk_skb: 241 callbacks suppressed [ 738.188118] audit: type=1400 audit(2000000503.100:52003): avc: denied { map } for pid=23076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.380128] audit: type=1400 audit(2000000503.110:52004): avc: denied { map } for pid=23076 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.562824] audit: type=1400 audit(2000000503.150:52005): avc: denied { map } for pid=23077 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.768300] audit: type=1400 audit(2000000503.160:52006): avc: denied { map } for pid=23076 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:43 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000f5ffffff00000000000000003800"/120], 0x78) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:41:43 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) socket$inet(0x2, 0x2, 0x1) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x0) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r4, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x70, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x80}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x70}}, 0x20000000) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x88001) write$P9_RXATTRCREATE(r5, &(0x7f0000000040)={0x3ba}, 0x7) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r6, 0x107, 0xf, &(0x7f0000000280)="a933fb23", 0x4) bind(r6, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0x102, 0x4) r8 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r8, 0x0) read(r8, &(0x7f0000000180)=""/19, 0xfffffe47) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4601, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000380)) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) sendfile(r6, r7, 0x0, 0x4e68d5f8) 03:41:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x121, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) sendmmsg$inet6(r2, &(0x7f0000000140)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x12, @local, 0xffff}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000080)="b9a940907299de32e50e1fa4f1711838d6bd48effc68f1372277b7d215c1c972114e371b6927", 0x26}, {&(0x7f00000000c0)="c1f9c00102a5777ff90dd4511f4fd937c30f1fcce2fe90c9a53ead9121b4e0957bc3ca29a89e", 0x26}, {&(0x7f00000001c0)="a66e71dea4b59213d46cad2a3fc0216d4195020765367f967026e6563363c458e002b25b26339a6b059b5796a194dd5c6841bd62d3ce40b18ce858a69fe49019f5e7f755325b8a0c", 0x48}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000300)="90503d6c12d7953e119b7b11c995917ecc4481930519f4e5edd9464e6ea304664759143e7e709b924723725cefc32d2bfad0bcd048e27216e62d771d3a7b23cf464a0f7d784b736aae5f2f8102919f7c28cab2e183d7229293017c15a293460c58c8bc08bc1c3ef81f1a928d6865e5443bce69c61fc6b0df83b77dc11ca1287062c5cd", 0x83}], 0x5}}], 0x1, 0x8fa16a7c6ffe5278) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x3bc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00000002c0)={0xa, 0x4e22}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000100)=""/16, 0x10}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 738.944546] audit: audit_backlog=65 > audit_backlog_limit=64 [ 738.957969] audit: audit_backlog=65 > audit_backlog_limit=64 [ 738.975051] audit: audit_backlog=65 > audit_backlog_limit=64 [ 738.982391] audit: audit_backlog=65 > audit_backlog_limit=64 [ 738.988221] audit: audit_lost=730 audit_rate_limit=0 audit_backlog_limit=64 03:41:43 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) getegid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 739.037700] audit: type=1400 audit(2000000503.160:52007): avc: denied { map } for pid=23076 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:44 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:44 executing program 0: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:45 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000bcb4e733c1ec4c0bd3e2070000180012000800010076", @ANYRES32=r3], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000001180)=0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000001140)={0x0, 0x0}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r5, &(0x7f0000000140)=""/4096, 0x1000) removexattr(0x0, &(0x7f0000000100)=@known='system.posix_acl_access\x00') 03:41:46 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@loopback, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_settime(0x1, &(0x7f00000000c0)={r2, r3+30000000}) sendfile(r0, r1, 0x0, 0x10000) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)=[0x0, 0xdab8]) 03:41:47 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:47 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:47 executing program 1: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x5c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000007, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x10, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendmsg(r0, &(0x7f0000001340)={&(0x7f0000001080)=@rc={0x1f, {0x0, 0x2, 0x0, 0x0, 0x7}, 0xe4}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001100)='9u', 0x2}], 0x1}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = epoll_create(0xcb) epoll_wait(r1, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x9146) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) close(0xffffffffffffffff) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800135a0000", @ANYRES32=0x0, @ANYBLOB="0300000000e3ffff07001b8100000000"], 0x28}}, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(r3) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r4) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r5, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r5) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r6, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r6) keyctl$KEYCTL_MOVE(0x1e, r4, r5, r6, 0x0) 03:41:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x2}) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000100)='veth0_to_bridge\x00') 03:41:47 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) mlockall(0x3) clone(0x40002400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="24002402", @ANYRES16=r1, @ANYBLOB="0100289d7000ffdbdf250500000008000600050000000800"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/25}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f00000001c0)="5d763315b5af687d2e6ba176276ed6063719246af94aeb55ef5b64fc1b6ff0f4035ffccadb450e42d26a8ca73b1b8c4b30afbebfe2003cd2229809a63b24eca05d67464b771eb0b9f415de5617fb0e81774a4fb5b81860af24c34d8170", 0x5d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) dup2(r6, r7) write$cgroup_subtree(r5, 0x0, 0x0) symlinkat(&(0x7f00000003c0)='./file0\x00', r5, &(0x7f0000000400)='./file0\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000540)={0x0, 'sit0\x00', 0x2}, 0x18) 03:41:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYPTR64, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRESHEX, @ANYBLOB="57b461798b4f07572833645a2f248416896791368e87921e3b1729ff3f5cad8c4e816873d7fa5bcf88b3ef2e01d03f7c199e601cc3e14f642c05c5fef7aa11e2b0b4df9412bf053af065e5d4a1caabd0e5e2214cade850b87c0636b078616e7981de5eb661d22008761de0d98f5ef88dafd441e8970616389ba6a4a21538d1f9bf55dfe132e10baff063c4f9447c70d9f683584df1c9f0e407aee87411840ed389e60c80d027c9dc54b7a5c55915418349924adcc27e40635e85a3200a6f8b66c63764d7582e50d4ce2f58880d0295d14d3dbead87d2c51c0e", @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT]], 0x123}}, 0x4) 03:41:47 executing program 3: accept$packet(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x600040, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001500050000000000000000000200000065dba63934a820c3000000000039000000000001f8b663f46cecc09f843c69b503baadc215e33d972525a6977bcf092a2421839d8d49872966583ff01d773d97b6fd4d8f224895"], 0x28}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) 03:41:48 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 743.239777] kauditd_printk_skb: 354 callbacks suppressed [ 743.239787] audit: type=1400 audit(2000000508.150:52316): avc: denied { map } for pid=23180 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.384646] audit: type=1400 audit(2000000508.220:52317): avc: denied { create } for pid=23165 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 743.546828] audit: type=1400 audit(2000000508.220:52318): avc: denied { write } for pid=23165 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:48 executing program 1: socket$inet6(0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = getpid() r3 = getpid() r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x8a120, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000240)=[@timestamp, @window={0x3, 0x2, 0x1000}, @sack_perm, @window={0x3, 0x5, 0x101}, @timestamp, @window={0x3, 0xb2, 0x6}, @sack_perm, @sack_perm], 0x8) rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000100)) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x1, 0x0) connect$inet6(r6, &(0x7f00000002c0)={0xa, 0x4e21, 0xffff, @mcast1, 0x8000}, 0x1c) r7 = getpid() r8 = getpid() rt_tgsigqueueinfo(r7, r8, 0x16, &(0x7f0000000100)) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r10, 0x0) r11 = getpid() r12 = getpid() rt_tgsigqueueinfo(r11, r12, 0x16, &(0x7f0000000100)) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_subtree(r13, 0x0, 0x0) setsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000500)={r3, r10, r5}, 0xac) fallocate(r0, 0x1, 0x0, 0x80000000000) clock_settime(0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r14, &(0x7f0000000000), 0x10000000d) r15 = getpgid(0x0) syz_open_procfs(r15, &(0x7f0000000300)='net/ipv6_route\x00') ioctl$TUNSETFILTEREBPF(r14, 0x6609, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r14, 0x400c6615, &(0x7f0000000200)={0x0, @aes128}) perf_event_open(&(0x7f000001d000)={0x1, 0xfe38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file1\x00', 0x0) write$UHID_CREATE(r1, &(0x7f0000000380)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200), 0x0, 0xfffb, 0x9, 0x4, 0x1, 0xffff}, 0x120) [ 743.692432] audit: type=1400 audit(2000000508.230:52319): avc: denied { map } for pid=23180 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) getrusage(0x0, &(0x7f0000000080)) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x9) 03:41:48 executing program 0: r0 = creat(&(0x7f0000000000)='./bus/file0\x00', 0x4b) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) signalfd4(r2, &(0x7f0000000040)={0x20}, 0x8, 0x80000) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x3f) unshare(0x20600) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) fallocate(r0, 0x3, 0x0, 0x8020001) [ 743.852177] audit: type=1400 audit(2000000508.250:52320): avc: denied { map } for pid=23180 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.968961] audit: type=1400 audit(2000000508.260:52321): avc: denied { map } for pid=23180 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:48 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 744.106187] audit: type=1400 audit(2000000508.290:52322): avc: denied { map } for pid=23180 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.287895] audit: type=1400 audit(2000000508.350:52323): avc: denied { map } for pid=23180 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:49 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 744.450956] audit: type=1400 audit(2000000508.370:52324): avc: denied { map } for pid=23180 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.470195] audit: audit_backlog=65 > audit_backlog_limit=64 03:41:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x7530}, 0x16, 0x2, 0x5}, {{r2, r3/1000+10000}, 0x0, 0x8ba, 0x1}], 0xfffffffffffffc58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) waitid(0x1, r4, &(0x7f0000000200), 0x40000000, &(0x7f00000002c0)) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x7fff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) ioctl$sock_inet_SIOCGIFADDR(r6, 0x8915, &(0x7f0000000380)={'bond_slave_0\x00', {0x2, 0x4e22, @rand_addr=0x46d}}) sendto$inet(r0, &(0x7f0000000100)="bd", 0x1, 0x0, 0x0, 0x0) r7 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_mreq(r7, 0x0, 0x23, &(0x7f00000000c0)={@multicast2, @local}, 0x8) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x6e8, 0x11, 0x0, 0x27) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r9, 0x6609, 0x0) getsockopt(r9, 0x4, 0x9f60, &(0x7f0000000400)=""/52, &(0x7f0000000440)=0x34) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) 03:41:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000003e00200025bd7000fedbdf25480e771b"], 0x14}, 0x1, 0x0, 0x0, 0x2000}, 0x20000c10) accept4$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e, 0x181400) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000840)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000041) r4 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000300)='\x00', 0xffffff0c, 0x3) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x70bd2a, 0x4, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = geteuid() geteuid() syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x2, &(0x7f0000000640)=[{&(0x7f0000000480)="ce9aa110dd540264cee5bf2e82095a67fd61743a9c9b6f5697e7830d97c4005e4d6539766a61c6872ed914de969a20e397db555466bd37e677d21d28b5f4f0653402eec6ad87fd97fccf36f30d6d5fb085579c3e796e9b", 0x57, 0x2}, {&(0x7f0000000500)="e0f68c8c38f70f1a400de850cc2bae1d24fceba190cc63d62f100ac16d739bd1cbda7ad22e154a251d90c47b2d55a324225b627421e8f590884a654793d7ea68dfc66e8e90a39d72480b046220b0e61ba698b77d366b6722d0b93ed89ed897c4856a51d0e4246c40127e3d0697b8354f9d0d565ac3b5e8dc5620e9ced2564c991f0a16662df522f82b64dc6861e8e238e06f15c420bc218d2287062462010a69332c2cea9c658c18fd485de43e6193aafbc9761a73342d3b5ac29138b4fea8a2d4eb064186137d54de9d92", 0xcb, 0x1}], 0x1001000, &(0x7f00000006c0)={[{@discard='discard'}, {@noblock_validity='noblock_validity'}], [{@uid_gt={'uid>', r5}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@euid_eq={'euid'}}, {@smackfshat={'smackfshat', 0x3d, 'security.SMACK64\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}]}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r7) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockname$packet(r6, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000bc0)={@rand_addr="0addcc20d0fdaafd16c49fd62fe4d1bf", 0x63, r8}) keyctl$join(0x1, &(0x7f0000000780)={'syz', 0x1}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 03:41:49 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:53 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) mlockall(0x3) clone(0x40002400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="24002402", @ANYRES16=r1, @ANYBLOB="0100289d7000ffdbdf250500000008000600050000000800"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/25}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f00000001c0)="5d763315b5af687d2e6ba176276ed6063719246af94aeb55ef5b64fc1b6ff0f4035ffccadb450e42d26a8ca73b1b8c4b30afbebfe2003cd2229809a63b24eca05d67464b771eb0b9f415de5617fb0e81774a4fb5b81860af24c34d8170", 0x5d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) dup2(r6, r7) write$cgroup_subtree(r5, 0x0, 0x0) symlinkat(&(0x7f00000003c0)='./file0\x00', r5, &(0x7f0000000400)='./file0\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000540)={0x0, 'sit0\x00', 0x2}, 0x18) 03:41:53 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:41:53 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0xe86e) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) connect$unix(r2, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) 03:41:53 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:53 executing program 3: mkdir(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000240)) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x9) wait4(0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$packet(0x11, 0xb6c93ddaca765399, 0x300) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc52f82f24186cf4b07b8d1d142da", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001a000000000000000000"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@rand_addr="a19be86e4ee75338ed43a89ff7aab21e", @mcast2, @dev={0xfe, 0x80, [], 0x25}, 0xffffff81, 0x3f, 0x8, 0x700, 0x4, 0x0, r4}) open(&(0x7f0000000100)='.\x00', 0x0, 0x0) 03:41:53 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes256, 0x0, "3cd53f6f6315817d"}) [ 748.305103] kauditd_printk_skb: 281 callbacks suppressed [ 748.305112] audit: type=1400 audit(2000000513.220:52577): avc: denied { map_create } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 748.337023] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 03:41:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x0, 0x87, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8101, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x1, 0x3, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8, 0x9, 0x38, 0x1, 0x7, 0xd11, 0x2ace}, [{0x0, 0x0, 0x0, 0x6, 0x100000000, 0x7, 0xa9}], "", [[], [], [], [], [], [], []]}, 0x778) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000140)=""/42) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000340)={0x0, 0x5, 0x1f}) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x3, @broadcast}}, 0x80) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000380), &(0x7f0000000cc0)=0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000200)={0x3, {{0x2, 0x4e21, @multicast2}}}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000b80)='/selinux/policy\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r9, 0x6609, 0x0) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) ppoll(&(0x7f0000000bc0)=[{r5, 0x2}, {r6, 0x10100}, {0xffffffffffffffff, 0x2250}, {r7, 0x8010}, {r8, 0x1c}, {r9, 0x100}, {r10, 0x8000}, {r2, 0x20}, {0xffffffffffffffff, 0x85ec4eb8aae1f601}], 0x9, &(0x7f0000000c40), &(0x7f0000000c80)={0x1}, 0x8) ftruncate(r4, 0x80003) sendfile(r2, r4, &(0x7f00000000c0), 0x8000fffffffe) 03:41:53 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 748.436536] audit: type=1400 audit(2000000513.220:52578): avc: denied { map_read map_write } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 748.573733] audit: type=1400 audit(2000000513.300:52579): avc: denied { create } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 748.666293] audit: type=1400 audit(2000000513.320:52580): avc: denied { write } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 748.774244] audit: type=1400 audit(2000000513.400:52582): avc: denied { map } for pid=23284 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.897682] audit: type=1400 audit(2000000513.400:52583): avc: denied { map } for pid=23284 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:53 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) get_thread_area(&(0x7f0000007d40)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000100)=""/17) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='pkcs7_test\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0xbe, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x20000005) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="11", @ANYBLOB="04112dbd7000fedbdf250e000000100007000c0003ad0a696c00050000003000020006000200de0a0000080001000500000014000200ff070000080001003200000004"], 0x2}, 0x1, 0x0, 0x0, 0x4000}, 0x801) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) socket$inet6(0xa, 0x3, 0xff) gettid() [ 749.020090] audit: type=1400 audit(2000000513.350:52581): avc: denied { create } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:54 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:41:54 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 749.150136] audit: type=1400 audit(2000000513.420:52584): avc: denied { map } for pid=23284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 749.280150] audit: type=1400 audit(2000000513.430:52585): avc: denied { map } for pid=23284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:41:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x4}, 0x21829, 0x0, 0x0, 0x0, 0x80000000000, 0x8}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002, 0xfffffffc, @loopback, 0x4}, 0x1c) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffffdf, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x16, 0x1, 0x2400000, &(0x7f0000000080)=[0x0], 0x1}, 0x20) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ff9000/0x4000)=nil) sendto$packet(r4, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x0, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="020000000900000091ee7a9d87a3b326289c32db56c7b94cbc8161eddbfdfced6211ea2b45758bcc348b05000000000000001537e08d415aba16575e85cde309e43382d1def8a7303fc0c7c305645ea3268591f33b72f720e8226aff18fe5a8bcb5e3757845637834e67d309f11a7579f253690b4ac51daf2e1bd548703c5768dfeba25903d23b123cbd43d1f275347414baf09b55a09793496648231463c5e41b7eebf71537fbc49bdbb1251116caadb197e5d5c2bd589d1fd7a3b82757d39d2e78be05cc2c42d680e819ff8896875cdaa043c626478b93a5ce5bea00000000000000000000000000000000000100af8f66a07b8592d80b4c040fd15aee00def6029003f6c146c17f11e70f4631710df337123fb7a3cc8f9f99f0b2563b6a729be49a18e99d7bc8817b4d63d080b8e2d8b15df3803c19f898fc554427aa7db8c96b5ae52fa4c14f5a18cda97e3c5ec52ea48adadd7b27e1eb1f7053deb298d687182ccec0e21f6fbed1e184848d5e1bb11813063b2af96a84520a01ee67cb716e6b444225"], 0x10c}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) [ 749.350262] audit: type=1400 audit(2000000513.460:52586): avc: denied { create } for pid=23271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:41:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) mlockall(0x3) clone(0x40002400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="24002402", @ANYRES16=r1, @ANYBLOB="0100289d7000ffdbdf250500000008000600050000000800"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/25}) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f00000001c0)="5d763315b5af687d2e6ba176276ed6063719246af94aeb55ef5b64fc1b6ff0f4035ffccadb450e42d26a8ca73b1b8c4b30afbebfe2003cd2229809a63b24eca05d67464b771eb0b9f415de5617fb0e81774a4fb5b81860af24c34d8170", 0x5d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) dup2(r6, r7) write$cgroup_subtree(r5, 0x0, 0x0) symlinkat(&(0x7f00000003c0)='./file0\x00', r5, &(0x7f0000000400)='./file0\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000540)={0x0, 'sit0\x00', 0x2}, 0x18) 03:41:58 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 753.331789] kauditd_printk_skb: 327 callbacks suppressed [ 753.331799] audit: type=1400 audit(2000000518.250:52914): avc: denied { map } for pid=23354 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.410180] audit: type=1400 audit(2000000518.280:52915): avc: denied { map } for pid=23354 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.457645] audit: type=1400 audit(2000000518.280:52916): avc: denied { map } for pid=23354 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.526808] audit: type=1400 audit(2000000518.300:52917): avc: denied { map } for pid=23354 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.595986] audit: type=1400 audit(2000000518.300:52918): avc: denied { map } for pid=23354 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.670122] audit: type=1400 audit(2000000518.310:52919): avc: denied { map } for pid=23354 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.728954] audit: type=1400 audit(2000000518.310:52920): avc: denied { map } for pid=23354 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.754344] audit: type=1400 audit(2000000518.330:52921): avc: denied { map_create } for pid=23353 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 753.778003] audit: type=1400 audit(2000000518.340:52922): avc: denied { map_read map_write } for pid=23353 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 753.840149] audit: type=1400 audit(2000000518.350:52923): avc: denied { map } for pid=23354 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.356411] kauditd_printk_skb: 811 callbacks suppressed [ 758.356420] audit: type=1400 audit(2000000523.270:53735): avc: denied { map } for pid=23451 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.384537] audit: type=1400 audit(2000000523.270:53736): avc: denied { map } for pid=23451 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.406858] audit: type=1400 audit(2000000523.280:53737): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.431654] audit: type=1400 audit(2000000523.280:53738): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.456381] audit: type=1400 audit(2000000523.290:53739): avc: denied { map } for pid=23451 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.479956] audit: type=1400 audit(2000000523.290:53740): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.510153] audit: type=1400 audit(2000000523.290:53741): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.536425] audit: type=1400 audit(2000000523.300:53742): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.561184] audit: type=1400 audit(2000000523.300:53743): avc: denied { map } for pid=23451 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 758.586344] audit: type=1400 audit(2000000523.340:53744): avc: denied { map } for pid=23452 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:07 executing program 0: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=@objname={'system_u:object_r:crond_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x5, 0x20, './file0\x00'}, 0x70) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x10000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x274, r3, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2164cdf1}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9671}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x230000}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd9a6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb7a1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ac}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x20, 0x2, @in6={0xa, 0xcc, 0x4, @dev={0xfe, 0x80, [], 0x11}, 0x20}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7fff, @empty, 0x50b1}}}}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}]}, 0x274}}, 0x4000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@initdev, @in6}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) 03:42:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@fragment, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000800)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd7\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9\x9a2\xd4\rQ\xdf\xab:\x93)4Yv;\xac\xafJ\xb8\xbe\xf4H.\xefZ\x8e\x16\x01\xbb{D\xc4\xaf\x9e\xf2.\xeb\x98K\xd8\x858\x13\x91\xce@\xb3\xb3Q\xa2\x9b^\xbd\xb8\x0e\x8d\v[\xf6\xcdm$\xb8\xf7e)\xb1(\x12#\xaa\x9f\xcd\x9cJW\x9b\xfbU\xf4\xe8\xaai\x17\xf0\xbcT\xc9^T\x12\xeb4G\xbdGAR\xef\x16\x1d\xf4\\\xaf\xb1\xf1\xde\x8d\xb7\x05(~5E\"03V\x1d\x8f0\x02\x86le\xce\x80L\xe0\xfe\xec\x9f\x10>\x8c\xa8g2\xd1\x0f\x93\x17\x01\xd5\x12\xd27\xc2\x91\xce\xe6rH`\x16P\xfa\"\b2\x04\xbci\xd6;\x0e\x15]\ayM[\x9a(l\xf2\xaeW%\x04\x04(\xd8zW\xf2g\xdb\xb75\n\x82\'\xf3\x04x') r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r6, &(0x7f0000000180)={&(0x7f0000000040)={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x26}, 0x8}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="4edc311e504b32c82444bee0278ba97c26e1daee02a7dac86faad0609752e53e", 0x20}, {&(0x7f0000000ac0)="941877fdbd58386bc62b543a8c465a1cea126d9ab16fb6302644dc071bbf39cce2c17c945ba4a05ae2124e43fb3b5d7ccd7705f2d2dc1c63645e3e27884b54f98e80923d6db3c2b6730508d898eab5b1d820c5377ab84525562aa3d08c01ada6e6040596ce610a74430676b3c2b4a2405cac616a9e82b4d99058a70bded7534f80f04de5bf9c8f73a907141f677eeca2b63f323c440033213474fad0c55a26481a0befd24c8d31a0ae7db09a83a23b5c42fbf6794f4f55c408facaf9969aa05141690bde177772a7f164001c4290c25a3a6b1705fd7e30566374db685e298251885a3c00c10767e8c77ae31c9ac9c18547b8371b9d57eabb0787ff6863deafb26d398cdc0a05c120942b8f3b43b6ebbe76a3e5d2454cf28815856b426f6633cde226c448bad9f883730e8ea3a70a9aa44bade92f34745694e08b6c3b8e64a7c0fe9c9309182e067a3fd9b4aff539c4e485eb27ae139dfdba0979adf22d3eeb55e4d58863b4e0a6f05da1c73190bb4d4e5d12535555dc6824e8e9d819cfc2a3ec994ab6a73c6ed073f213adc11cc4588f60617ea0e867e0aee1097c626904c6ae665ef3b54ccb95eb03367550fe5df442197bd53d2e1a5fcaa381a35ac4fbe8828658495bbfb2b7d2a4d59a68077e4ee69932cca1ffc25386a42fea65b4ce368dae2d1068666bdb791e566ce46a95e4d8949f6aa00be81e012590748853f4d74fc300d75d8419b481b641c49fc662e3e1b43ef640b073ff914545780e22a5d071d8d17bcb35247eff02993e98e6c03f7b7f0707ea765f132ef3c42eaef2843bb8f596e0b253783336bb6c34e862703e95c3a6765c79c2ff671191bff3ec599558fdfce8e4064c08c3e65eb33a38875bd667517039d26b11cc353aa9e3f1c987300fdaa6aefaf5364a37362cd4542c3f70649f3d888458d234d2303b360c71bde60ff29fec54ab1d53b3e9e1144c1fb69fcf2b956d6e91f0ec15a6070251ab04da471e12a49f398ea3d01935660e673c442ee7c3e8dd738c482a4be1783f5aceced7e7188b3e8f36fc8eb84e51e3a070eccde06a54699a8d0fed1926323e90ddffe38372b62e3d88cd7ed52bf82b8f511a4bb97926add9ddbd7c813b5b3966b3254bc01c0eb8231af1f64561ba9ee4ff0adcf0d7794a657ae174dd029dc16911c8d6bc08c9f1dd47dba9d6e1c878b30983712cb27d093e333bbebbd598c71222acce4f8280613be29392a1cc03a9d7180bfbe2cf2d31f8d41d4852a023a06b553dfd2b9a2a12cbee85dbc4de51ed8c6ed3ddf909db23508917d5a371bb38fced3d0cf7a855b78bd2110e86e0306fd15642d237a1b289516627cd61dc0f5338749a74578e4a4e15814e8dddd897bd9ff961ed9a746780075d768ca9320528b253d68fe58fff57aee67e5bd80cfe3c98e92f30558700f21e3d18050a1ab856aa4fd64ac096b61ffe859046636a249032d3f77ab8c1a0d08e072c4f222ff0f41311d872941438d964ab819317e942da874d4d5717621cd10baabf21e0ab1689d472ae37ec583de425de9938e0c26d32a641a668405c14b110de6c6c1e5f35bd5003cc83488a3696bebfea7c825a9bfaaaf3d7eac59033f461cd28d80bafeea97949f1dd77ae0552b0f8d7b786ea87e3e0e7d5450516108926fae14a0973d0d529446369beab5d54578645830a8cd42b7791b0e383542218b6f2e4a2ce79cc890529533fba1ba7fe91154d85819b1496ae0edbece49161b55fe1b78837c1ca6045cf093b94486e5db75195acb97d87316722b775cc6d145729e3b8af970f1870fa7ff922cf42dcac1072f102e61f67d70d491f01e02d054710ea9b374d66bcd0940d1a168d5c60d95e31d84584883e57305740bf357df2ac65acd6cd7490299ca956243470a3a0ab070738776f328eb7f9c13f8ea141c2d87235ccb35f1300fe10a52429daf78b513add5d4297178ac40f6a4e86fc6e370f747b3c6cb7de9402add03f9707d448560f52c36e3ac64ed3a98425e1b5f0f86acd916cb5ba24abf1f5a9bd914ece07edd102a4b82bd2eb84dfacb5901b3bb49b8892440159a253e64e2360ff6603b55dfb4a85856fd223a4a21125360fe84ca0d3af5e9f26a43c80ebec0b07860ea42da4e5bd7b6788af56cf18ad02446f6cbee7ce27381e74b6831fa52faf1d22259f2a3bf23f8fc77eeac63c5131c382cb2d13384053def5729f4ca8bd77902b7c1ac95e78780fe4245ccaf6fab48af5dd6737d5bd827889b1f1aa06e6254f35d4a092e408afd973cdc286d8877abc7196bfe91f0c439228883806cf0cff255861c05d027b301e83a433d10720ddea7ac81959662c7f72880b9dd6e7dde39a35489cbbf50e5455fab91c4ffb2757f923a55400ce73a41a504f224557bc123af2d51e4966ca4d77275651339c11feee628017cb3e6ec317618f3b88ac30fe1a51d2735a720fc75bf59cfeda250e269099f8172a242390345e7b9ded93ee9de5143afc98aa67e589ae881d68c132111e9698cb28862fc6ee375ed89b32826bada1c3c3452c5232c4f2a02e15cf88b203403adc920edec0b95c518313197c0b4c6a815d4360bdc1eff38c21ae2894a209f1e1dcfb80e7af39d945692bd3318efdf85294b9cc81770000bb1813627bb393648cfe834b94a0bef2e3c74180fa56bc981da732db21f363f900968126d1ed2d2a9f71abf839c896da543840ec1dad3a4b53274b32acb108b0e03bf516a713618de1ae4992c283e57f966272732f98fa9acfad5b3945e3d7a80748e485e65e53fcca4753161a2961772567f758c5ebf67ab3baf5298006daa2259fa6d7322c6d526146ee97dec6a6f0f74ace19bd15fad9f00769ee935d56823124211274a38edd7f078e045f2109359f7dc6265280df258469cdcc3f5a99dabc3d8551c29da7623c4b55892dabd517d9ee5276cfefb6b99d362617944d92dc00f39439508bf4990a540ca100e3652c74780dba2f1bb1ad1f86c1b9fc4f38e9301481d9d576fd69b73a63e104a0ebb784dabd421199d5b803b639758b23683ddcaa0493b1bdd987c630df722e00e8d5994c3e3f9d6218a94469d0237149adba361e2f3ba0a8a217b28afc08b4243bb9a18b42db3bf748352d749252419cf7b2411c3bf9eeeb09915ab8cd687dd80c60e10e18f0840bb6b4bc284acf4638ad05abf76f1735b066be930d2121a9f28ee540fc8684bbcd62b5ee1d3cfdec34c15f0c4745f670b6399f2df1d5dd93adaea5a5777bdd25ae9664fcc86e5852d7486087d219d82540e2603d50a73c8f57bc291644eab54fddef7ad597be645189a07115b313609c5f88aed0c85a4aa8c9ab0e79ed8783d6359f2e96a3ff73868991ed49dc393fcb4eb24a79470cf07feb8696c1cb4704458318c12cfc66b513c8938be599aa46f514da109596c51836447fb9c0f0c3809ffe285ae509919c341ef375f74774d2e2a654fa8640e9b8d3ab22f22462f260c99ea1f5ac6b567e7fb524f7d2b5edbe8fce5bd534b1bf26f2008eda7a839d3550aa8426388c94ef5be0d10cf66334eaddb236552667208397dd13013eebe38dc56ffbbae6de3fced3b1a26f2135122e981c5a436337afff81d1b457c27fbb758e6b51084d892a1bc16b56b6ee8afc623c78aa61ab50de8881b34f6ec77e2adfc31bbb961a327927426af9e2c8bd1c1de2bc2f51c1c42f9d2bf77998bce3ccd076963879b539b7eda7fe4cdd329a00fb2664131e3525a85f9490bf316b0f028bbfaa7336b347144b4b19c643d4471c0aa1ede5550c82869461e8e06c7a38107935abcd7746bbae5965c92080ad5529140c939733aff1ab91809a4a67ed0401a4ee9354738047f9e6070b945307a63cc8d7c708582f0f4c5b1f6b6ca8d28ff8ff5764875e8c6e274b4a5a3d6b847e164ef32a324a5718ffc2ef44b66b5834a3d24cf65c7bbef68b91cc44984a206d2684356887ae44e2e7f4f20e6a44fa64104e25e05288b7f689f09b7883f574fd79a96197fdabc11af1a8f3cdcb37c4077a806df22d6789f61f25c12eb8fa65379660902ada4ea33c542219d15039de4e41d7ea44711e6efdc21bd1ec5786df02d93d87af36666a8b174a9b56a4f254ae7825a9bdc80fe7a37efa36ddf0460485e727cca20ab1865b83a3a20742dc88bffd6be79167bbedcae6d71e025af61f8e98acd8be5a9e40a105562311d7996d34d80049abc12ed6ae65321b128793432644ccf2a1ddcdba8c3779d28ea2561e4faa814bf088355596c56024b2f752427cd6ed1431751cf551865e8fca14fd5b48ffb54c1c841754e9b533e0e2b9adb2cd078578a0f0e2bba8af5e3cef37bcad13cef023d65e34199b6167a917053cfae822a01c80b6863a771c7cf02a53fd791133c953e5bd363855094d88c5d9c19bf9f15833a44854cfaa79b602d530f6e548c45cd08ce4c02de30a27d4bc40716ef07cd9f34587d5551dfc43ed86441a059a7767a9d9b884ef95a6d8b5f10c927c5010b49e541f745fc62cffad854bb8c52f65ab43873825e30083c50e9ce90a99a4dcdf2817e2287f1d6711cf989a16daec5e0f43113710d8f78fad556fee0a346d30ff655ccaf7537e0efac2da43f3a346b2047766d89114ced8839298d1779d3b594c6f304595b7db2b2648041e728a52f50c99e2a9bcd8a3abec27af4ac153855c0c48e44f3409ff7a35cd2b4aa6b2b371f619cd14712ab58fb66ad0433f62e9dba5b72b2f8e4366f780d315c0d7ccf2e77a04a3df42f462c267d62e96d87c8f6027f38630154e3718f9923e3032f63ecb3e4f8f1f074a5a3b46fb9b1f51640ccdfac4583a29a314d7fd353e013bd57f3ea1ba45ce3fcbdf0e98bc707bb8177e43d9ffa6847a9ee13d99a68129d19af7d17ea7cbbba86a7eebee2e667fb0ef5b8ff6d61ed6dc6238229d975ed5c759db7bc6239a355126423939fe271e7a19b429e6bf7977a29bef422a04f96143b8ac93dabd2e6cb19ad17944d8b22148798b6e7ea682175eec98727b8ad47559369aa741ddd6ec335f9db34a28a2fb3e0023ffcdcbf480ea5ddefacefdff48b8f62c85a6b80a1226e36f32964855be8dcdf7806497f69acefe622f61440c26618e0d6b26954060842408c61b32ca680354a3e0fbac7ac0d4947bc05131ea2bf1217c45ac43789e85fe036bf9dc4cece2fffec344de4072dbaffab978363357cc6432fcf0d1228c54c5047c80153b7bfc23f81f5b2270cc09b7e85bffc3106ef4ca4b4897bebddcbdd0a82fc55f8043c4cb8b4f0423ef208b52e435eec35f5d65f9b4b76082bade03bf6d5ff65ad7d044b8d6b46e0cab6f8b6f238626bf42412315911cd3bf77fd663742c8f81c118cdd93c961312edca3cc78c7d126ca236be677de37b106dfa8fb5f705d801774df0efe127acf58c0ff6c50c7af82e2c3b9d52b5f3242de030458e1ed8c4f3dec097d26272cea03820166a5f16af4718c4961d47ffbf7ca6f88af9dd6e5c1fa1683c49ce759da57dbd6175f502f0f20513cf25649b079dd553698773f67e8017cac7f777e888d9193aca8857939392426f39e9671f4dc11f2b19c913fb023487972bab63fd7b41b00b0cfbbbc844f96d51347ee0a7224ff01b2c16b794f322d59e8eb842b723c1eefd22af5e8a1c1048fb2390397c99f9443f66ae58e2b318ae2b0c171c7af7cb8bde48118966a95355b12a6c3f7786eb4dbeb3b6a7ebc42973bfb59a2586a1b7944f29c4774dc6e7945e326d4654808fdea850d4b64b5008c49d45b4207d40dcfdcbb0a33820df4dfec3c38e979d99e6a", 0x1000}, {&(0x7f00000000c0)="ae8901ada9013dd2895545f1bc56a5a047241790499f2fc22ab901e9196f349c381e3642a792", 0x26}, {&(0x7f0000001ac0)="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", 0x1000}], 0x4, &(0x7f00000002c0)=[@dstopts_2292={{0x48, 0x29, 0x4, {0x2f, 0x5, [], [@calipso={0x7, 0x28, {0x0, 0x8, 0x3f, 0xc5, [0x1, 0x6, 0xc667, 0x3]}}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x5, 0x0, [], [@pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x3a, 0x2, 0x2, 0x4, 0x0, [@rand_addr="e56261a84d3fcbf271c3f3b4f4668b52"]}}}, @hopopts_2292={{0x60, 0x29, 0x36, {0x2f, 0x8, [], [@generic={0x5, 0x2f, "11a64a521b7aa8971275ac8f86c86c9680dc377717267f352ea61b641150bff2cf9942ee99a83f6df1091d372f737b"}, @ra={0x5, 0x2, 0xd1b}, @hao={0xc9, 0x10, @mcast1}]}}}], 0x108}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r2, r0) r7 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r7, 0x29, 0x41, &(0x7f0000000400)={'nat\x00', 0x2, [{}, {}]}, 0x48) 03:42:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r2 = dup2(r1, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000000)=""/240) close(r2) getpeername$packet(r2, 0x0, &(0x7f00000004c0)) close(0xffffffffffffffff) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3) r3 = perf_event_open(&(0x7f000001d000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r3, 0x402, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockname$netlink(r4, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) creat(0x0, 0x1) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="40000000e21ccb983202f662d4de202479f42e0220fbf89d83280ed206f683feb90e431ef93e20f14b36e04cb93ed6476430a9d258752ede69e061612ab4e8d4fdcedbabeeeff453b9e27aace2b45f0bc48204d2e30def84709f5ee338e12eb9f9d8", @ANYBLOB="000000000000fbdbdf25"], 0x2}}, 0x0) 03:42:07 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/urandom\x00', 0x40000, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x10000) perf_event_open(&(0x7f0000000140)={0x2, 0xbe, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = socket$inet(0x2, 0x3, 0x1f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e22, @empty}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000300)={0x8021, 0x1}) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) mkdir(&(0x7f0000000080)='./file1\x00', 0x4) dup(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setitimer(0x1, &(0x7f0000000280), 0x0) 03:42:07 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:07 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_subtree(r0, 0x0, 0xfffffffffffffdf5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400202) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) r5 = getpid() rt_tgsigqueueinfo(r5, 0x0, 0x16, &(0x7f0000000100)={0xffffffff}) r6 = getpid() r7 = getpid() rt_tgsigqueueinfo(r6, r7, 0x16, &(0x7f0000000100)) tkill(0xffffffffffffffff, 0x38) 03:42:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x80000001}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000017a8a989fbbb73ec91f8bb1fa35dc20f8468f42eb71faa9764d757deba16299f25962580d08e265de4c2a008a7ba2eefec8bdc51c04e6dbbb49e7e264346120f9a21dfafed0093f29c0122fe654cddf3e344dd0d06d9d006ec545421c5c1b8e3f7d8076df6731f92c96d9b7e7dacc3228e5259c0ac4429f0f373ff1c0c366964483c53c4e279ef981dbcfd8b35563dcc604e49aff11e8c1c548416a113b0089d0950381aa2e65d754837801e8584dc5fa2f8e66c2514b8a03fad23c72c25428445be51ef488a71e3086091013b56f4f89e32213ef88cc5750601"], 0x10}}, 0x0) dup(0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') r5 = dup(r3) sendfile(r5, r4, 0x0, 0x40523) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x1, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x17) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYBLOB="a90451200fa592ff7890df14b738000000100005070003000000000000", @ANYRES32, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x4}}, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x4, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r11, 0x8919, &(0x7f0000000300)={'ip6_vti0\x00', {0x2, 0x4e20, @broadcast}}) getsockopt$inet_int(r11, 0x0, 0xfffffffffffffffc, &(0x7f0000000280), 0x0) getsockopt$inet_mreqn(r11, 0x0, 0x62, &(0x7f00000004c0)={@multicast1, @local}, &(0x7f0000000500)=0xc) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x80) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r15, @ANYBLOB="00000000110000001800120008000100767469000c5273f19f067200", @ANYRES32=r15], 0x38}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x1, 0x0, r15}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r16, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r17 = syz_open_procfs(0x0, 0x0) r18 = dup(0xffffffffffffffff) sendfile(r18, r17, 0x0, 0x40523) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6, @in6=@local}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00'}) r19 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(r19, 0x4c03, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r20 = dup(r2) write$P9_RFSYNC(r20, 0x0, 0x0) 03:42:08 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:08 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 763.437546] kauditd_printk_skb: 658 callbacks suppressed [ 763.437555] audit: type=1400 audit(2000000528.350:54403): avc: denied { read } for pid=23533 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00\x00\x00\f\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@remote, 0x6, r3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x40, @rand_addr="0700000000000000ffffffff6d00", 0xde84}, 0x57) sendmmsg(r0, &(0x7f000000ac80), 0x800000000000226, 0x0) [ 763.584568] audit: type=1400 audit(2000000528.400:54404): avc: denied { create } for pid=23533 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:08 executing program 3: r0 = socket(0x0, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x802, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000500)=0x54) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000002340)) write$uinput_user_dev(r3, &(0x7f0000000680)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, 0x45c) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{0xde6, 0x0, 0x8001, 0xc9}, 'syz0\x00'}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r5, r6, 0x16, &(0x7f0000000100)) r7 = syz_open_procfs(r6, &(0x7f0000000240)='net/netstat\x00') fsetxattr$security_ima(r7, &(0x7f0000000380)='security.ima\x00', &(0x7f0000000440)=@v1={0x2, "38b864b2125ebf0142"}, 0xa, 0x2) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r8, &(0x7f00000017c0), 0x315, 0x800000) getresuid(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bd) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x48, 0x0, 0x80, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x240cc091}, 0x20048035) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 763.732205] audit: type=1400 audit(2000000528.410:54405): avc: denied { write } for pid=23533 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 763.829859] audit: type=1400 audit(2000000528.490:54406): avc: denied { map } for pid=23555 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 763.916186] audit: type=1400 audit(2000000528.500:54407): avc: denied { map } for pid=23555 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='a', 0x1, r1) keyctl$read(0xb, r2, 0x0, 0x0) r3 = add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, r2, &(0x7f0000000280)=@encrypted_load={'load ', 'default', 0x20, 'user:', 'mime_typesystemppp0]systemwlan0posix_acl_accessposix_acl_accesswlan0vboxnet1procproc#l', 0x20, 0x3, 0x20, [0x35, 0x31, 0x0, 0x65, 0x4, 0x38, 0x65]}, 0x86, r3) preadv(r0, 0x0, 0xfffffffffffffef4, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x200000000000011, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="05"], 0x1}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, 0x0, 0x0) r9 = open(&(0x7f0000000840)='./file0\x00', 0x80, 0x40) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffc8f, &(0x7f0000000200)={&(0x7f0000000900)=ANY=[@ANYBLOB="0c0000001000010800000000ffdbdf2700000000", @ANYRES32=0x0, @ANYBLOB="000004000000000000002b000000030003000000000001001500000000000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="180000000700000000000000400000009500000000000000"], @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='syzkaller\x00'], @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/220], @ANYBLOB="001104000100"/24, @ANYRES32=0x0, @ANYBLOB='\v\x00\x00\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="0400000004000000"], @ANYBLOB="0000000010000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="020000000b0000000300000005000000"], @ANYBLOB="0000000000000000000001000b00000000000000", @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB="18000000030000000000000001000000181b0000", @ANYRES32=r8, @ANYBLOB="000000000000000085100000fcffffff9500000000000000"], @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='syzkaller\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB='\x00'/158], @ANYBLOB="001e00000300"/24, @ANYRES32=0x0, @ANYBLOB='\t\x00\x00\x00', @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="0200000005000000"], @ANYBLOB="0000000010000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="00000000030000000104000001000100"], @ANYBLOB="000000000000000000000300010000000000030004000000"], 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r10 = socket(0x200000000000011, 0x0, 0x0) bind$packet(r10, &(0x7f0000000240), 0x14) [ 764.002989] audit: type=1400 audit(2000000528.540:54408): avc: denied { map } for pid=23555 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.118894] audit: type=1400 audit(2000000528.550:54409): avc: denied { map } for pid=23555 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:09 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 764.231025] audit: type=1400 audit(2000000528.590:54410): avc: denied { map } for pid=23555 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.341615] audit: type=1400 audit(2000000528.640:54411): avc: denied { map } for pid=23555 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.457618] audit: type=1400 audit(2000000528.640:54412): avc: denied { map } for pid=23555 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:09 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x100000000) syz_open_procfs(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r4, r5, 0x16, &(0x7f0000000100)) ptrace$setregs(0x4c873fa0e29a0c48, r5, 0x0, &(0x7f0000000200)="50615fcb0ba6be0cf695d882b366236486ee000c9be270ca6804") r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000600)=[0x0]) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 03:42:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x100) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) INIT: Id "3" respawning too fast: disabled for 5 minutes 03:42:09 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 765.502506] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 03:42:10 executing program 3: unshare(0x2000400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000000200)=@raw=[@ldst={0x3, 0x3, 0x2, 0x4, 0x9, 0x0, 0x10}, @call={0x85, 0x0, 0x0, 0x2c}, @exit, @map_val={0x18, 0x4, 0x2, 0x0, r1}, @alu={0x3, 0x0, 0xb, 0xa, 0x0, 0x1, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80000001}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffff8}], &(0x7f0000e6bffc)='GPL\xfb', 0x5, 0x70, &(0x7f000000d000)=""/153, 0x0, 0xe, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9}, 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x70) r4 = fcntl$dupfd(r3, 0x0, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r4}, 0x10) 03:42:11 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file1\x00'}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0xddea2be3381be200, 0x0, 0x100108, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x1) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/create\x00', 0x2, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f00000000c0)={0x0, 0x1000000}) r4 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="100000000100000018010000000000003a441608ca9e66e4bcc58c2411707d4ff5fdc14fec8aee2c094bec301f6935804b09d4dba27c9438d829212c2be0759ed36aa27da7300e3a7cdb1470a66c3831274067d81ed3d8605468b2e23338fff4efe2b9ecf53cb8b8a2743f42cdae64e006d8db6e72b7045ea8a85ede55047a191a3e6b1c7d6d79c632d5fa0498b8ec81ee20954448073e45c085ec05008ffca68cdf12296b55c936099a0b24fdeed430371565e4210f821c78310b21d0fa207b0ca04d0cd60c2d0aa62a590078531623"], 0x10}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) r5 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r6, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8ec43db8fdcd0f4a881951863c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a12728c86ba4091ebfe1d07d497540f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a"]}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001640)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001680)={{{@in=@local, @in, 0x4e24, 0x80000000, 0x4e23, 0x0, 0xa, 0x0, 0xa0, 0xbe, 0x0, r7}, {0x9, 0x50b, 0x1, 0x7f, 0xfffffffffffffffd, 0x4, 0x3}, {0x4, 0x9, 0xffffffff, 0x3}, 0x9, 0x0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1}, 0x4d4, 0xff}, 0x2, @in6=@local, 0x3502, 0x4, 0x3, 0x200, 0x9, 0xffff, 0x1ff}}, 0xe8) r8 = add_key$user(&(0x7f0000000400)='user\x00', 0x0, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) r9 = getgid() keyctl$chown(0x4, r8, 0x0, r9) r10 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r10, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) r11 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r11, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r11, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) socket$key(0xf, 0x3, 0x2) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) sendmsg$TIPC_NL_LINK_SET(r12, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB="0003005654fa000000fb000600000000fa99b9a950a06197f8f303e49b5122c7127350bb1e45d451aa00020004341b"], 0x2}}, 0x4000004) ioctl$TIOCGSID(r12, 0x5429, &(0x7f00000005c0)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x0, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8210000000500000081951863c52a43f7740de9c8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a18ab234cd25efc491e0d8d32728c86ba4091ebfe1d07d494b9302cfa1173313c7907540f9831322c1"]}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001640)=0xe8) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000600)="01fbf2c16cbaf429983303c76310f4fbd077a45a3ff7e6f77ecb2bdc747a5e4822b47f70b638615e168274f4d089fccab5fa3495a1117fc1f31a4cf53b92375568d9a7e986f1b13a6596a2a561332e286dc4346bea5b784d19c490c6dabe18d2ebefd861d769a6e90982b4db3dcc82783f1b7a4c1aeda4b607fa2be9ab93f0bd2db25074caff8ba11aa6dd4218db49b5e9136c777b6b3565636109efa677a5fd38c0ded5dc9b544d37dfe829359c120084cdfc1a865208ac1813d7963e031d21a5cbfa0c", 0xc4, 0xfffffffffffffffb) 03:42:11 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0x33}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) bind$unix(r1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x3ff, 0x0, 0x8001, 0x1}, 0x10) preadv(r1, &(0x7f00000017c0), 0x1b4, 0xc00) 03:42:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='mountstats\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x9) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0xdd, "89e0b50b48fe889a7842259c60151a87f3f10d36979aaa3e9d867f5504fdd0db65c55c5e4cc05c0947e098fde420174b212a8e667a9e596a8f3cb72cb6f25e06e34ee3d717df7992906a48b03e6eed97f80259defba2d5b79468f438984e5f3a912ce06122bf473c0c26e93931a9495bf7f6d411ea4d578e3de0c837a758ae09c21c713ddce56a4aef5922f7c7023ca7f380254ae8324d90ebf914c9a7d36393448a0a9a2126cd9ead310679a40c29f49266b09774a06c622a20e37f17461d883ab8627adac6d00ad2c88b401360f8f7da4e2fec62a7e03ed34233fb38"}, &(0x7f0000000100)=0x101) setregid(0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x0, 0x80000000}) creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000000280)={0x1, 0x3, 0x1000, 0x47, &(0x7f0000000200)="2ceab12f8529d5de4fcc6729ccbc24fc92e19eced3ef6f785076e0269c2163c3e88ad2f510af38279f0aa7c02342c300e3150efb8fb9729895a2de4ea7827632bcdd5aea4f8831", 0x1000, 0x0, &(0x7f00000008c0)="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"}) write$cgroup_subtree(r4, 0x0, 0x0) write$smack_current(r4, &(0x7f0000000000)='nodevwlan1\x00', 0xb) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:42:11 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:12 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)=0x1ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000005c0)={0xa}) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x600880, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000580)) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) getegid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x7fffffff, 0x7345, 0x80000000, 0x40, r5, 0x6, [], 0x0, r6, 0x1, 0x4}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r7, &(0x7f00000001c0)="5a1b91e8f1f5aa82ebba9384f757b6c206d07e044796be9cfa10f6f54892fe9a5bd2a1480e56a749249595bb8a8c630362d07c0d36512a02fb49a9bd85f86a5ffe711053d5846832dd13dfb74a17c792726e69efb8b2ea46a1f56bc7cc130c415abc9658d6cec8962608570790efa8d08fbc29b489e8405efe51fa8df5a37000cb47743ee8f374313abd68b69f5bad6a0bb07dad84610114264c5caec2849c7bb5a9f7cfc3475063b744e4eed09b57930d51a9493f1fa6541437dc38732ef10239c3411a7dcfa03507b8947e756dd93989aabb064883de9055313ad672446384b28b122c8fb97d9c6973d114d8e67b9b9f409ec7a26d1b", &(0x7f00000004c0)=""/174, 0x2}, 0x20) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000653815bb2a1f4f9d7aa7661c26517597cd050000000000000000", @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="d4", @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="080001", @ANYRES32=0x0, @ANYBLOB="1000635a00000000200004000000"], 0xb, 0x0) getegid() geteuid() fsetxattr$system_posix_acl(r2, 0x0, 0x0, 0x0, 0x0) 03:42:12 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:12 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:12 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$security_ima(r2, &(0x7f0000000100)='shcuriuy.ima\x00', 0x0, 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000003c0)) r4 = dup(r3) r5 = openat$ppp(0xffffffffffffff9c, 0x0, 0x101002, 0x0) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r5, &(0x7f0000000080), 0x0, 0x0) r6 = dup3(r3, r5, 0x80000) write$P9_RREADDIR(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="c5000000290100090000000800000000050000000000000007000000000000000407002e2f66696c65300502000000030000000000000009000000000000000007002e2f66696c65303001000000050000000000000000000100000000000107002e2f66696c65301002000000040000000000000001000000010000000307002e2f66696c653000040000000300000000000000ff070000000000000469bf2e2f66696c65302802000000030000000000000009000000000000000307002e2f66696c6530"], 0xc5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000040)={{0x6, 0x2}, 'syz0\x00'}) r7 = socket$nl_route(0x10, 0x3, 0x0) setitimer(0x0, &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000400)) splice(r0, 0x0, r7, 0x0, 0x1420000a77, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c000704ab092506090007000aab08000600000002002593210001", 0x1f) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:42:12 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000040)={'bcsf0\x00', {0x2, 0x4e20, @empty}}) socket(0x40000000000010, 0x803, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) prctl$PR_SET_DUMPABLE(0x4, 0x2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x1) 03:42:13 executing program 1: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8}) socketpair(0x5, 0xa, 0x0, &(0x7f0000000200)) r3 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r3, 0x400, 0x0) fcntl$setlease(r3, 0x400, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x4ffe0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r8, 0x0, r9, 0x0, 0x4ffe0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={@empty, 0x3c, r10}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_genetlink_get_family_id$tipc2(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 03:42:13 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 768.252936] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. [ 768.282546] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.311207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.344658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.382348] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.438903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.456420] kauditd_printk_skb: 257 callbacks suppressed [ 768.456430] audit: type=1400 audit(2000000533.370:54670): avc: denied { write } for pid=23663 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 768.484833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.562251] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.564840] audit: type=1400 audit(2000000533.380:54671): avc: denied { map } for pid=23674 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.619153] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.688794] audit: type=1400 audit(2000000533.380:54672): avc: denied { map } for pid=23674 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.692180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.724217] audit: type=1400 audit(2000000533.470:54673): avc: denied { map } for pid=23678 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x0, 0x3, 0x3, 0x2, 0xffffffff}}) r3 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000080)=@routing={0x0, 0x4, 0x2, 0xc0, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x1c}]}, 0x28) r4 = dup(r1) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) 03:42:13 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 768.796149] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23669 comm=syz-executor.0 [ 768.822898] audit: type=1400 audit(2000000533.490:54674): avc: denied { map } for pid=23678 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x14, &(0x7f0000000380)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000a80), 0xfffffffffffffffd) eventfd2(0x4, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000480)=0x78) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_newroute={0x34, 0x18, 0x1, 0x70bd29, 0x25dfdbfd, {0x2, 0x10, 0x20, 0x1, 0x0, 0x1, 0x0, 0x6, 0x200}, [@RTA_IIF={0x8, 0x1, r3}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x28}}, @RTA_GATEWAY={0x8, 0x5, @multicast1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @local, @loopback}, &(0x7f0000000500)=0xc) sched_setparam(0x0, &(0x7f0000000080)=0x200) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000100), &(0x7f00000001c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000880)='oom_score\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) [ 768.933487] audit: type=1400 audit(2000000533.490:54675): avc: denied { map } for pid=23678 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffd16) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0xff}, 0x0, @in6=@dev={0xfe, 0x80, [], 0xfc}}}, 0xe8) sendmmsg(r0, &(0x7f0000006ec0)=[{{&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x400, 0x1, 0x4, {0xa, 0x4e20, 0x3, @mcast2, 0x4d9}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000007c0)="4f610523a722fe571fe2e992c6e462bb790a1b72ffaa304b764986c977b1e9a17404363124d346a475c48ec7a08a152eb42a9fed0894673859c4d2b292b8219ceb7e77d2b2b2ab30901cc579cfbf1b6576812269c24b68a23d8ab67778f73461d1ca9734367fbf71c12c073ece324c44b9e07eb5d3c418b741254049313fd169c7a8e2ca0fd461313f3d841111d53bac60ac047c1f552e10c04a4fb76aa28fb10f8265ada1845044d9157b7a7664ae9c0381fed4954cb0b2cd30e748909414b3b761a18c3652d5fed220cde365cfa7424effc23835b2a87276c9ef5ebd13ffbc0c36ec441adfc4e80cb164ee2193f719d246ea1375c86619d6", 0xf9}, {&(0x7f0000000640)="da5b3dd04af75d14bd552974be62de8e68f894cb91f86b28ea1613db6d24cb95b5726241606365fd302cde805c3402a5a5546092c2541cdbfb9d627427f8de4fc30905a8127b", 0x46}, {&(0x7f0000000240)="cff3eb72ef75c01b44f397952441", 0xe}], 0x3, &(0x7f0000004ac0)=ANY=[@ANYBLOB="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"], 0x23ac}}, {{&(0x7f0000002c40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @remote}, 0x4, 0x2, 0x2, 0x2}}, 0x80, &(0x7f0000002d40)=[{0x0}], 0x1, &(0x7f0000002d80)=ANY=[@ANYBLOB="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"], 0x5e0}}, {{0x0, 0x0, &(0x7f0000003700), 0x0, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x120e}}, {{0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="f6a1d8dea65b7f4006204f61556701c54616adc2914b8d7f6c18ac6de68903"], 0x1f}}], 0x4, 0x2) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x80000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r3 = socket(0xa, 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'syz_tun\x00'}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000034c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000003480)={&(0x7f00000033c0)={0xa8, r4, 0x919, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x9cd5ca4133e7ddf9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0xa8}, 0x1, 0x0, 0x0, 0xc000}, 0xb01a4601ba723476) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000004c0)={0x1f, 0xffffffffffffff28, &(0x7f0000000700)="34561df07c5dfb30c5329179ade3b8a0fe680063d78a29da1850673a2fc27f4205a0966be3fc421b916ea51bda2f289913a3942a0386f64f3d04e8ccb864b3ae1c8512c9780afef931dc65d299f5fc0b94cc9edc9353cf3245266574e1bc910406d3e9a48b50b633424969716795cd24ebe0a58d5290dff3ed6d5a7c4e0530da0b"}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='\x00\x1f\x00\xe0\r\x00', 0x2, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000002cc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2, @perf_config_ext={0xff, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000280)=0xfffffffffffffffd, 0x227) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e21, @dev}, {0x2, 0x4e21, @local}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000}) sendmmsg(r5, &(0x7f0000000400)=[{{0x0, 0x0, 0x0, 0xfffffffffffffc24}, 0x9}], 0x1, 0x40000001) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000580)={0x8, 0x5, 0x2}) getsockname$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) [ 769.025774] audit: type=1400 audit(2000000533.490:54676): avc: denied { map } for pid=23678 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.053314] audit: type=1400 audit(2000000533.520:54677): avc: denied { read } for pid=23663 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000080)='sched\x00') sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) fcntl$setsig(r0, 0xa, 0x20) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$UI_DEV_CREATE(r4, 0x5501) [ 769.110274] audit: type=1400 audit(2000000533.530:54678): avc: denied { map } for pid=23678 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.162593] audit: type=1400 audit(2000000533.570:54679): avc: denied { map } for pid=23678 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:14 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffe6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x8) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) alarm(0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r2, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) 03:42:15 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:15 executing program 0: io_setup(0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000140)) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) r3 = openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f00000001c0)={'syz1', "e8fc82b9e5bd65860a67a27e5baf69c481a88e9b8c1ea7777259841483b3bd2a7b"}, 0x25) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 03:42:15 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) INIT: Id "6" respawning too fast: disabled for 5 minutes 03:42:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000080)={0x80000008}) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = dup(0xffffffffffffffff) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20002000005) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) write$binfmt_misc(r4, &(0x7f0000000180)={'syz1', "bd0fb36f9b7eff3bb9438ce0e92421aef4831747bda6fabb225c9a0e53e30b1d3bb61f8226c024de91cbb99702825b21bfb0a28c9240b4554bbd89ad50d175b013f587026f148da132229edea93f10e2ba0f84fcf5981b34509fceda056082c016b4bc8856672013174efae288fd892d611a9fedc9ba7f291a99116f8e037663b307dceee84b62144b26f4e8b520974ef69c2877b50bb407db79638b81884fcbae3e22816e25e44d1183a0393744867f7097efdaf2918565d3f50c0385e2e2fd15f29c62048aacf9a0e5958ee0938160f41cab0d9783"}, 0xda) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'ipddp0\x00', @local}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) 03:42:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x144000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x9, 0xffff000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="611200bf200000000000000700009500000000000000699ba4ebc36b3e56ec6700000000000015060000000000000000010002000000070600000ee60000bf260000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000000000000000000000000000000069500ac83d6a3ccb03c4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x2}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, 0x0}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bond0\x00', 0x1000}) 03:42:16 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:16 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x80000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2000, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f00000005c0)='msdos\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="646f733179666c6f7070792c70eff400"]) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 03:42:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) r1 = open(&(0x7f0000000100)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, 0x0, 0x2008000fffffffe) fchmod(r1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 772.224446] FAT-fs (loop0): Unrecognized mount option "dos1yfloppy" or missing value [ 772.352081] FAT-fs (loop0): Unrecognized mount option "dos1yfloppy" or missing value [ 773.482089] kauditd_printk_skb: 288 callbacks suppressed [ 773.482098] audit: type=1400 audit(2000000538.400:54968): avc: denied { map } for pid=23777 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.560140] audit: type=1400 audit(2000000538.400:54969): avc: denied { map } for pid=23778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.640207] audit: type=1400 audit(2000000538.400:54970): avc: denied { map } for pid=23778 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.720151] audit: type=1400 audit(2000000538.400:54971): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.755706] audit: type=1400 audit(2000000538.400:54972): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.793953] audit: type=1400 audit(2000000538.430:54973): avc: denied { map } for pid=23778 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.824439] audit: type=1400 audit(2000000538.430:54974): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.849373] audit: type=1400 audit(2000000538.440:54975): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.875530] audit: type=1400 audit(2000000538.460:54976): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 773.930128] audit: type=1400 audit(2000000538.460:54977): avc: denied { map } for pid=23778 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes [ 778.491672] kauditd_printk_skb: 892 callbacks suppressed [ 778.491681] audit: type=1400 audit(2000000543.410:55870): avc: denied { map } for pid=23877 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.520261] audit: type=1400 audit(2000000543.410:55871): avc: denied { map } for pid=23877 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.547397] audit: type=1400 audit(2000000543.410:55872): avc: denied { map } for pid=23877 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.573198] audit: type=1400 audit(2000000543.410:55873): avc: denied { map } for pid=23877 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.598965] audit: type=1400 audit(2000000543.410:55874): avc: denied { map } for pid=23877 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.623514] audit: type=1400 audit(2000000543.440:55875): avc: denied { map } for pid=23878 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.647239] audit: type=1400 audit(2000000543.440:55876): avc: denied { map } for pid=23878 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.669573] audit: type=1400 audit(2000000543.460:55877): avc: denied { map } for pid=23878 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.695300] audit: type=1400 audit(2000000543.460:55878): avc: denied { map } for pid=23878 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.721970] audit: type=1400 audit(2000000543.460:55879): avc: denied { map } for pid=23878 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:27 executing program 2: munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 03:42:27 executing program 5: open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = memfd_create(&(0x7f00000002c0)='system.snckprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) socket$inet6(0xa, 0x80000, 0x1) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="34c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9dfbe93fc6bccc58a45983021e94740e06994342c64dd8165ebea25878bfddcb23aff02a78a8da2560890b8f323579e28943ebc6c05f442ec8ab4712545e6e3d021fdf6b8ff2137a52dc71c80e3c56001709c67a1ec8cb09597ca220c"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) creat(&(0x7f0000000400)='./file0\x00', 0x0) 03:42:27 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000000}, 0x2, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x9, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x400, 0x80000000}, 0x0, 0x0, 0x0, 0x9, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r7 = getpid() r8 = getpid() rt_tgsigqueueinfo(r7, r8, 0x16, &(0x7f0000000100)) r9 = getpgid(r8) syz_open_procfs(r9, 0xfffffffffffffffe) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 03:42:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000080)={0xba, 0x7, 0x6, 0xba3}) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2c, &(0x7f0000000280)=0xfffff800, 0x4) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x406, r0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x9) mount(0x0, &(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)='sysfs\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0/bus\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:auditd_unit_file_t:s0\x00', 0x28, 0x0) 03:42:28 executing program 5: open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:28 executing program 2: [ 783.501240] kauditd_printk_skb: 558 callbacks suppressed [ 783.501248] audit: type=1400 audit(2000000548.420:56438): avc: denied { map } for pid=23960 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.714267] audit: type=1400 audit(2000000548.460:56439): avc: denied { map } for pid=23964 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 783.988009] audit: type=1400 audit(2000000548.460:56440): avc: denied { map } for pid=23961 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:29 executing program 0: 03:42:29 executing program 3: [ 784.208170] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.215549] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.225025] audit: type=1400 audit(2000000548.480:56441): avc: denied { map } for pid=23962 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 784.233910] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.257473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.269863] audit: audit_lost=757 audit_rate_limit=0 audit_backlog_limit=64 [ 784.283050] audit: audit_backlog=65 > audit_backlog_limit=64 03:42:29 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:29 executing program 2: 03:42:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x40000000, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000500000000335aadbcd6bd94205fab18edbb00"], 0x38}}, 0x0) 03:42:29 executing program 3: rt_sigsuspend(&(0x7f0000001800), 0x8) 03:42:29 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x50}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:42:30 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:30 executing program 2: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001980)=[{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 03:42:30 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 785.462558] input: syz1 as /devices/virtual/input/input14 [ 785.592817] input: syz1 as /devices/virtual/input/input15 03:42:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = dup2(r0, r0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:42:30 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000000180)=""/15, 0xffffffde) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:42:31 executing program 5: creat(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/240) close(r1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8000) close(0xffffffffffffffff) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(r2, 0x402, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f00000001c0)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="40000000fe1ccb983202f662d4de202479f42e0220fbf89d83280ed206f683feb90e431ef93e20f14b36e04cb93ed6476430a9d258752edf69e061212ab4e8d4fdcedbabeeeff453b9e27aace2b45f0bc48204d2e30def84709f5ee338e12eb9f9d81e2ad4", @ANYRES16=0x0, @ANYBLOB="000000000000fbdbdf2502"], 0x3}}, 0x0) 03:42:32 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:32 executing program 0: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:32 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:32 executing program 3: r0 = getpid() setpriority(0x1, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000000)={0xa, 0x7, 0x1, {0x1, '['}}, 0xa) socket$nl_route(0x10, 0x3, 0x0) 03:42:32 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:33 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xe3, &(0x7f0000000140)="f5b7c90a8e74c56d4bb920b34dba231f43718c586a582f63838a65f75eda255b226ef90b740c07f2ee9c9d17ab01006ebed79d40aacc66e86bf51b6820920a5cd9037f30cfe2d359a916d049e05ca62bff9f01da143863aeed4f5495176c82586646084138d165bd5b51e290203bf20739486ee5178aa0b49af860df91f8ea7b6e45f2297b70c9c52e4d9916f5fe54c0480a1d77ba91f26a833e46b457403824232f4cb25f924ca16d6ccec4f3022fd69bf233a83c5e7d50641f389fb085150d2bb469358966a9e2c52e007e339537074fc38ad3db5c0a9fc6b9d5f7b1cdef116ebc6e"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 788.524270] kauditd_printk_skb: 306 callbacks suppressed [ 788.524278] audit: type=1400 audit(2000000553.440:56703): avc: denied { map } for pid=24071 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.626791] audit: type=1400 audit(2000000553.500:56704): avc: denied { map } for pid=24075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 788.746815] audit: type=1400 audit(2000000553.500:56705): avc: denied { read } for pid=24059 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:33 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 788.930112] audit: type=1400 audit(2000000553.520:56706): avc: denied { map } for pid=24075 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 789.061636] audit: type=1400 audit(2000000553.530:56707): avc: denied { create } for pid=24058 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:34 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x1) [ 789.190200] audit: type=1400 audit(2000000553.530:56708): avc: denied { write } for pid=24058 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 789.280291] audit: type=1400 audit(2000000553.540:56709): avc: denied { map } for pid=24075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.365102] audit: type=1400 audit(2000000553.570:56710): avc: denied { map } for pid=24075 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 789.506149] audit: type=1400 audit(2000000553.580:56711): avc: denied { read } for pid=24059 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 789.627926] audit: type=1400 audit(2000000553.610:56712): avc: denied { map } for pid=24080 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:34 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:34 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) faccessat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x73, 0x200) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r1, @ANYBLOB], 0x3}}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f00000002c0)=""/247) r4 = dup3(0xffffffffffffffff, r3, 0xd31b069ea748f329) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000080)=0x7ff) r5 = syz_open_procfs(0x0, &(0x7f0000000480)='loginuid\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) write$P9_RAUTH(r6, &(0x7f0000000400)={0x14, 0x67, 0x1, {0x40, 0x400, 0x2}}, 0x14) dup2(r5, r3) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_TIOCOUTQ(r7, 0x5411, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000440)={0x0, 0x4, 0x5, 0xb35, 0x10000}) write$cgroup_subtree(r7, 0x0, 0x0) sendto$unix(r7, &(0x7f0000000100)="9cf087440cedf33999a9af33131eefe30e4b422b58d61da83175f8c72036d13026350b22c2091e27f30f32289297ebef36d4e40e3fc254bcee43398671c2919a1d09d2112b4b4c95161007c8a74c7765c25132a3136e49fb11d3e3dfa2cb10d6c6", 0x61, 0x40000, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 03:42:35 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) setrlimit(0x1, &(0x7f0000000140)) rt_sigprocmask(0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x8) io_setup(0x7, &(0x7f0000000240)=0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f0000000400)=""/4096) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000080)=""/106) r6 = memfd_create(&(0x7f00000003c0)='m\xb4Su\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xa3f7013a589d3f47) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000280)="04", 0x1}]) 03:42:35 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x80003, 0x6) r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)={0x488, 0x9}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000180)={'bcsh0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') r4 = creat(&(0x7f0000000400)='./bus\x00', 0x28) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000825bd7000fddbdf25030000002400060000e21956f62018521400070008000100", @ANYBLOB="e49b5ad79f89ecb0737cb6607b55bf0a5e2d0000d0ac78a77f60d4b88843245b3e225109c9c9b6e38f223299c944cbfe3e296ba79006c82599e11fdb10227f29b02e4ce3d14201416e30ffb6ebec28e7184765c79f4dcece7f5782d33ef621fef5292aa60746969a0870d1a995f9215cd527763b3abd914f3ce9ba3dc591f474c436035bcc495dbc51b327ba5ced8bc6a2ea4185760cee70c32f817e13127c03eaf2c279de491f528d0bc08c39838da4773ef1a3e445f57489207a6ccc3c323830b6a43a176727b43fbcc7a0da3de159a86ea528932fad330740c92924f2ea60d6dae04f35dedae271ec23d6703e8a85ffdb08476f37cda6", @ANYRES32, @ANYBLOB], 0x6}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r7, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r7, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r7, 0x800, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x3, @bearer=@udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x1) r8 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x3}, 0x20) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r8) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000804}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cfd20005220c7fc28dbc99cc9a49a3067d007b1cedd2dd931bfae1f30c1dd348b2b4e63062de60358730dcf291ea18957bab378b2236503ed9feeb2baf9e34999410daeef3fd9ce3db17e7fed4ccec5ec65103fdc7dfa145600ba196c13ad6dc35a4c5d9d565b9202ed30a519fbd6dcc7a9445eb74fc8ca3", @ANYRES16=r3, @ANYBLOB="00002abd7000fbdbdf25010000000c0008002802000000000000"], 0x20}}, 0x0) pipe(0x0) pipe(&(0x7f0000000280)) 03:42:36 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) syncfs(r1) r2 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f00000001c0)=""/160) 03:42:37 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 792.482665] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 792.624934] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 03:42:38 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:38 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) getsockname(r1, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000200)={'stack ', 'eth0:/!self\x00'}, 0x12) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 03:42:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f00000000c0)) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv4_delrule={0x58, 0x21, 0x4, 0x70bd27, 0x25dfdbfe, {0x2, 0x10, 0x20, 0x40, 0x8, 0x0, 0x0, 0x3, 0x10001}, [@FRA_FLOW={0x8, 0xb, 0x81}, @FRA_SRC={0x8, 0x2, @remote}, @FRA_SRC={0x8, 0x2, @remote}, @FRA_GENERIC_POLICY=@FRA_FWMARK={0x8, 0xa, 0x7}, @FRA_GENERIC_POLICY=@FRA_GOTO={0x8, 0x4, 0x6}, @FRA_FLOW={0x8, 0xb, 0x7}, @FRA_GENERIC_POLICY=@FRA_L3MDEV={0x8, 0x13, 0x3}]}, 0x58}}, 0x0) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200000, 0x0) fallocate(r8, 0x2, 0xffff, 0x5) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="188da4eaf3aeceeebc0000008e00000085100000fbffffff182a0000", @ANYRES32=r1, @ANYBLOB="000000000004000085000000550000000b4500010000000085000000670000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x47, &(0x7f0000000340)=""/71, 0x40f00, 0x0, [], r5, 0x1, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x5, 0x6}, 0x10}, 0x70) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r9, 0x6612) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c00)=ANY=[@ANYBLOB="30000000100001080000000000000000000000000963f2", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000a0000000000"], 0x30}}, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @initdev}, &(0x7f0000000680)=0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r11, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r11, 0x6612) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 03:42:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000010c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000180)='\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) fcntl$getflags(r2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) r4 = open(&(0x7f00000011c0)='./file0\x00', 0x420000, 0x4) ioctl$EVIOCSKEYCODE(r4, 0x40084504, &(0x7f0000001200)=[0x8, 0x2]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) getresuid(0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f000000b600)=[{{&(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10, &(0x7f00000000c0), 0x0, 0x0, 0x11c}}, {{&(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="f0dcfbb351", 0x5}, {0x0, 0x27c}, {0x0}, {&(0x7f0000000280)="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", 0xe03}], 0x4}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 03:42:38 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 793.560711] kauditd_printk_skb: 250 callbacks suppressed [ 793.560720] audit: type=1400 audit(2000000558.470:56963): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 793.729673] audit: type=1400 audit(2000000558.510:56964): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_compat-2.13.so" dev="sda1" ino=2683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:38 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 793.883714] audit: type=1400 audit(2000000558.550:56965): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.023650] audit: type=1400 audit(2000000558.570:56966): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnsl-2.13.so" dev="sda1" ino=2693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 794.181169] audit: type=1400 audit(2000000558.590:56967): avc: denied { prog_load } for pid=24184 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 794.353307] audit: type=1400 audit(2000000558.600:56968): avc: denied { map } for pid=24167 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:39 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000009c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a00)={0xf0, r2, 0x303, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x130}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x2080}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x3af, &(0x7f0000000180)={&(0x7f00000002c0)=@updpolicy={0xfc, 0x19, 0xe31, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0x21}, 0x8000, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x73}, {0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, [@tmpl={0x44, 0x5, [{{@in=@empty}, 0x0, @in6=@rand_addr="f91729603a705ff083db40a905ff3708", 0x1, 0x0, 0x0, 0x0, 0x2}]}]}, 0xfc}, 0x8, 0x0, 0x0, 0xa8079045156d6f91}, 0x800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x400, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) getdents(r6, &(0x7f00000001c0)=""/96, 0x60) write$cgroup_pid(r4, &(0x7f0000000100)=r5, 0x12) [ 794.529914] audit: type=1400 audit(2000000558.680:56969): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:39 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 794.673185] audit: type=1400 audit(2000000558.690:56970): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_nis-2.13.so" dev="sda1" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000c) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="1f0000000202193b000007000000068100023b050900d630d086d23d2135f5", 0x1f}], 0x1) open(0x0, 0x0, 0x0) creat(0x0, 0x184) open(0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = creat(0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x40) io_setup(0x4, &(0x7f0000000040)=0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = creat(&(0x7f0000000480)='./file0\x00', 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r10, 0x6609, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r11, 0x6609, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40086602, 0x400007) write$cgroup_subtree(r12, 0x0, 0x0) r13 = accept4$packet(r2, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14, 0x91327988ef1a4cea) r14 = openat$full(0xffffffffffffff9c, &(0x7f0000001840)='/dev/full\x00', 0x0, 0x0) io_submit(r3, 0x8, &(0x7f00000018c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000000080)="f734a5a0bc310d89af0fb8e401707a8fe93d0da70a069735b514b99ba099dc2448090ed56b3c79502b517c646f0769a5c352bd20c07711d3606992061c56871d80ad2c8992852a7e1e81f60d828fed191d6916f58e5952660c4a233fb7c2392783c3bd9f6fb8163b947d7db5e2ddf5078abf90015e89a6a697fb497f6a72e25f24aeb67c0d63a216796720e74f1b76a7f669338a", 0x94, 0x2c59, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x1, r4, &(0x7f0000000180)="fa5b3df3f2c2bdab6b6255ff15afe33a3ec801f7d69dca48350c583e4178097e0720f12678e6eb47e4d3824415cb490c61b8a70423b88992736c22558e418ea1b9fb44176818c04a3162573e93d76ee04ba9ff592bd4bfa41f9302557756be8bd2643e4eadd0cbfc322f98377b819bf04b6d2428104741deb08c088e57ecb16e90f7097248b2bc9f95a2fbcd7001efc65c9fce92661d441d0b48e6b625f527d1830aa9f09d4227b5b62af955aa2ccc", 0xaf, 0x3f, 0x0, 0x5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x6, r5, &(0x7f00000002c0)="903f68e9e12153b3deb484825261f5865a05ed24503ebf959416d46874d4", 0x1e, 0xfff, 0x0, 0x0, r6}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x2d32, r7, &(0x7f0000000340)="4282b15ccca97a4f93999dd616d8e5b2c94e5b21bdc40360f128403e1f66307fe582d744f636700cf66f9f8e13b329994f1b1b7eed5d46a011aa615ef657edb97dc440a5bccec1a111264eaa67a729fa58f214d178bd7afc0975a90a9b312120a31c26b27b1b942ab3d4792983ba614b4af0820dff3fc5826f3e289be3baa1bce9af9b3ce0e4840c10c4bc006d14e0ec7be64f69b32dbb0a39910e11c002f6c22bf4a3db0a1e5529f26d02c285f8d9804466420d28bcdf03668ebbb357b4775df381f165cff5481487c1cabb80f2862378dc36647badd2fb3f859fe92be9", 0xde, 0x8aba, 0x0, 0x0, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x81, r9, &(0x7f00000004c0)="6543dde903d27d249f00f30ff57d62bff74e69d7b0eade3a6ccc66d2de4636174056eaae0a92122a5431c70fb7ae4762a0086efdd8ecb9", 0x37, 0x9, 0x0, 0x1, r10}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x6, r11, &(0x7f0000000540)="b649f518038098ee3668f836466e76fc3f6e23d11c713ecc46d8d006e48abeb191c6d342184d88a1bfbf823f00537429339095f8040e85ccc6fa332c3933185bebf8e87b4ab9fe29ded018a667d32a4df2299eb0326e4d573a0754aee6b60a520f43f87759dc3764aa7173e243c99bf405c1033b28413a0ed77c0166482b299a1cc84e86cf4f8fdb0e462c331d9bb9e858cb70616d7e551d6a2d282a4c361b4cf5d90f20b38444f5bd0138c1a3d7db60ebc92b76688c921885ed3d7a6ee2629cae4296a41734ab8c7ab94c7e", 0xcc, 0x0, 0x0, 0x1, r1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, r12, &(0x7f0000000680)="64d8a67a4b86e84cf76a72c09d5dd91b27fb320406546a99f377c6b23665e82b63d3a8b5fc203af976c53b0c0211e2a69729be04ef752395d5497fa95ca6027ad5c4e23c31c40c7497a8be2ac22ea10a6de81e586ed356b870a623d874913fd41dda9817e2daeafd79e79e4364e96c6696048db3120b5d9c524de8641e1fc2c2d7824b1f4559af632447d61b8f3b04b5bef6777c1332ebd8c0345b6d3942ce006dcf3bdf37bc442e866b52ff890124322c9dc8a519c7c89b213da9f165045ccc33c726c69d2765a57e08b7905501bb40d2742970d8", 0xd5, 0x0, 0x0, 0x3, r1}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x9, 0x7, r13, &(0x7f0000000840)="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", 0x1000, 0x8, 0x0, 0x0, r14}]) 03:42:39 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:39 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 794.833939] audit: type=1400 audit(2000000558.740:56971): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 795.030148] audit: type=1400 audit(2000000558.750:56972): avc: denied { map } for pid=24167 comm="getty" path="/lib/x86_64-linux-gnu/libnss_files-2.13.so" dev="sda1" ino=2714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 795.522664] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 796.075100] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 03:42:41 executing program 1: ioperm(0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) write$selinux_context(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) close(0xffffffffffffffff) remap_file_pages(&(0x7f0000003000/0x9000)=nil, 0x9000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)='sysfs\x00', 0x0, 0x0) 03:42:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept(r0, &(0x7f0000000080)=@nfc, &(0x7f0000000100)=0x80) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0xfb, 0x31, 0x7, 0x8000, 0x2, 0x6, 0x4, 0x52, 0x38, 0xb6, 0x4, 0x69, 0x20, 0x1, 0xa00, 0x4, 0x6}, [{0x1, 0x9, 0x3f, 0xfff, 0xfffffffa, 0x800, 0x9, 0x2}, {0x6474e554, 0x401, 0xffffffff, 0x0, 0x6, 0x2, 0xff, 0x10000}], "e6faa72ae9f074190170b5766f54559e3c2b9eee08acbbfe29c4bde810913d7429ba362ac2cd81347561a758e52c7c0c5c1fed700e42a6e4f12ac0733d6df4ca6ea653a32f2a5dd4ab19fe114f34d0d1e80c5cf056379b87f38cda4a13c3a25cbae642a918c84b1e0040de71ead719b76f3084a8a4df0d7da38e8a7c38d894a11684144f24c45625aedff85c68b24d852f2fb61ee14d4339e48df4d52ffcf81905d5d080cf06d7cf85cd2dd3c4b24fa82847b1c9367a13066f8c3639dd153b4a7cc9ff6a79c332510939c6d6a50853f6c5e1829420bb613a", [[], [], [], [], []]}, 0x650) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x4100, 0x4) close(r0) r2 = socket(0x840000000002, 0x3, 0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000007b80)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="4e89b854a782dd0800000095f9db27f20992b085adcfa479270c3095bb921ac1487883551409aa966fd12890a600"/60, @ANYRESOCT=r3, @ANYBLOB, @ANYPTR=&(0x7f0000000980)=ANY=[], @ANYRESOCT=r2, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000006d00), 0xffffffffffffff92, 0x0) 03:42:41 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', '', 0x20, 0x8, 0x20, [0x36, 0x62, 0x62, 0x33, 0x61, 0x34, 0x0, 0x62, 0x61]}, 0x35, 0xfffffffffffffffe) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000100)) write$P9_RGETLOCK(r1, &(0x7f0000000080)={0x23, 0x37, 0x1, {0x2, 0x10000, 0x2, r3, 0x5, 'load '}}, 0x23) times(&(0x7f0000000040)) 03:42:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:41 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:41 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:41 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x4e, 0x4, 0x7, "39277106ba09bb1b393fe2ecf2655c2e", "035de1d7f108c365a4f192973e6089e08cc1a80a6f2357891c55dbca2c8550c9867465b8a6dbe82cccba827141b4ab8ed7af373c05e5eb7500"}, 0x4e, 0x1) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x20, 0x0, 0x8000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xa1004008}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4000110) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0x4, [@local, @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4f1c0a65a229750c}, @remote]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:42:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:42 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:43 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 03:42:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 798.895267] kauditd_printk_skb: 247 callbacks suppressed [ 798.895277] audit: type=1400 audit(2000000563.810:57220): avc: denied { map } for pid=24297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.060954] audit: type=1400 audit(2000000563.810:57221): avc: denied { map } for pid=24297 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.162475] audit: type=1400 audit(2000000563.880:57222): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.262228] audit: type=1400 audit(2000000563.880:57223): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.333825] audit: type=1400 audit(2000000563.900:57224): avc: denied { map } for pid=24297 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.399065] audit: type=1400 audit(2000000563.930:57225): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.465110] audit: type=1400 audit(2000000563.930:57226): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000002c0)='./file0/bus\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="ff5b5922af2748bc68dfab8d4c8941f94d8a4e9e2f48f0544fec5035f31765fb918413f6"], 0x24) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) open$dir(&(0x7f0000000400)='./file0\x00', 0x9741160abbe49fa7, 0x54e630c0d85b6c75) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000380)=0x8) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000003c0)={0x14, 0x11, 0x1, {0x44, 0x4, 0x2}}, 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xcf01d642caa0fb71) creat(&(0x7f0000000440)='./bus\x00', 0x80) 03:42:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:44 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:44 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:44 executing program 3: r0 = socket$packet(0x11, 0x8000000000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x4000000000001004}]}, 0x10) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x9) sendto$inet6(r2, &(0x7f0000000180)="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", 0x105, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000000400), 0x40000000000017a, 0x0) [ 799.522518] audit: type=1400 audit(2000000563.970:57227): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 1: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000400}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00022dbd7000fedbdf25080000005000010014000300fe8000000000000000000000000000bb08000800090000000800010009000000080004004e2200000800080001000000080009002f0000000800010006000000e96a26105cc146cb0246602ca4b84108000b007369700002"], 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fstat(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setresgid(0x0, 0x0, r4) getgroups(0x3, &(0x7f0000000580)=[0x0, r4, 0xffffffffffffffff]) fchownat(0xffffffffffffffff, &(0x7f00000004c0)='./bus\x00', r3, r5, 0x400) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x8, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0x3, 0xffffffffffffffff, 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000480)) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x400, 0x0) perf_event_open(&(0x7f00000016c0)={0x5, 0x70, 0x20, 0x9, 0x5, 0xfb, 0x0, 0x0, 0x20120, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x6, @perf_bp={&(0x7f0000001680), 0x1}, 0x20, 0x5, 0x8, 0x5, 0x4, 0x0, 0x2000}, 0x0, 0x8, r8, 0x5c34e819c1f2d2e8) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r8, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000017c0)=ANY=[@ANYBLOB="487b1c4d2c2da386c3b08db047092ed3da5bddb113afc0985bab9a35f0a2aaf5bbf7cc4a1d23b6eb6225510000000000004f59761c71b63b914973ef1e67bcbe2b81fbe6c96bce49cb37a68e8c025a982b1b9c8ffc18c31f140a598fcca39d7ab1109228dd70aa8da6d42df415489e41c29a", @ANYRES16=r9, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x40000c4}, 0x40000) sendmsg$IPVS_CMD_SET_SERVICE(r7, &(0x7f00000005c0)={&(0x7f0000000400), 0x0, &(0x7f0000000440)={&(0x7f0000000600)={0xe0, r9, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x78, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x7, 0x746731d655b56880}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x10}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x10}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0xe0}, 0x1, 0x0, 0x0, 0x1}, 0x8044000) fcntl$notify(r6, 0x402, 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800011}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x44030}, 0x8080) [ 799.662553] audit: type=1400 audit(2000000563.970:57228): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 799.786286] audit: type=1400 audit(2000000564.000:57229): avc: denied { map } for pid=24297 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x3, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000006c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xfffffffffffffc35) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x20d) sendmmsg(r2, &(0x7f0000002dc0), 0x49a, 0x4ffe0) r3 = socket$unix(0x1, 0x3, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r3, &(0x7f0000002dc0), 0x49a, 0x4ffe0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) sendmsg(r4, &(0x7f0000000240)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @empty}, 0x3}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="4dd44c25eaf0ba4d589ce9caeae04fbcdf9dd0017dddcbb673c79ed3b02017c02d164ff15453c18ea4e57c2a46b3624984b49ca2f1fa9df9c0d997f3aa94538c7ed679ae24ca599a49e440f85cc7dba9f81971d456d265777bb7ef6ca4d6da742175919ff7fa8f99edbaf1407a", 0x6d}], 0x1}, 0x28000044) dup2(r0, r1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) inotify_add_watch(r6, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x4000000) 03:42:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:45 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:45 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x20) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r4 = timerfd_create(0x0, 0x80000) sendmsg$nl_generic(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x200, 0x14, 0x4, 0x70bd2c, 0x25dfdbfd, {0xa}, [@typed={0x14, 0x4f, @str='eth1userppp1)-\x00'}, @generic="17afa7eba7ba01311cd1ddf4883f92457f5b4198d8479747e84abcac8b5dd23a467ef2ac2378593baebf5f1b20463d12d16e6f2285a70d49f4af7e2f2d3c4a94b4ae1b9f4a1446b5aa8861080ff28fe9126bca2eea2f48811fd878a9ed92a24d25f4b069ae4ebf58ec8348df3e6de46ad0a028b968f5b0b522fca8ebdabe3601a9f5fdc1f4376f524300741873bd5b2b1c3a6bd668172a7b57c2704673842c5d1bd4c2054eb750f5d140221ff9", @generic="949142", @generic="78587d8709998f055f7e5efbc2db484698fef9df4bbef5427d19dfb6bf76588270", @nested={0x28, 0x65, [@typed={0x8, 0x34, @uid=r3}, @typed={0xc, 0x6b, @u64=0x3}, @typed={0x8, 0x7c, @fd=r4}, @typed={0x8, 0x4b, @u32}]}, @generic="2d843a4015e3cceba8af69a628c2c2e489a290a7c57e2ca009f7166457d472b1f67c0d12fd1031cf22a3c487652765304bee8a51d8b50f79d4de629032d6df3d7ca2facdb0c1c7c6179eb63c4a5432cc0308351f3ef12af05ea78c358cd3a0942026ce0468b629438a2e07d44e711ddfa1c813", @typed={0x58, 0x11, @binary="eeebfb7f5c612d7d0ea0cff475b587b12085a27f03c34b16ead444bf480d67c1ab8cd023aac3b8092d79e9b8dfb3067f387d36157ebfb76da715d1c1eac2fae8ad86433d8e61da9428d642abe15027673748b6"}, @typed={0x14, 0x25, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x200}, 0x1, 0x0, 0x0, 0x24800}, 0x2000) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x80000, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xe8, r6, 0x10, 0x2, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7fffffff, @remote, 0x7f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8044}, 0x4000000) getsockopt$sock_buf(r5, 0x1, 0x1c, &(0x7f0000000640)=""/40, &(0x7f0000000680)=0x28) r7 = openat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x620000, 0x128) getsockopt$IP6T_SO_GET_REVISION_MATCH(r7, 0x29, 0x44, &(0x7f0000000700)={'icmp\x00'}, &(0x7f0000000740)=0x1e) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/checkreqprot\x00', 0x40, 0x0) fadvise64(r8, 0x0, 0x7, 0x0) r9 = eventfd2(0x7, 0x1000) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/enforce\x00', 0x4080, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000800)={0x0, r10, 0x9, 0x7, 0x0, 0x79}) r11 = request_key(&(0x7f0000000840)='rxrpc_s\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)='/dev/full\x00', 0xfffffffffffffff9) keyctl$update(0x2, r11, &(0x7f0000000900)="1c8c2c521c73b49eea1fbd6d501c36c7db658828bf138a62b0efd48ff223188e169aa8170128be8efaf5a3e8e084b94e1da7aed0495557bdf94ade7db894e55478171b5848dac2e0c51b5c828adb5164eda58ad295fa6763eee27b5cf96618d8adca14", 0x63) r12 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r12, 0x894b, &(0x7f00000009c0)) r13 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/net/pfkey\x00', 0xe500, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r13, 0x541b, &(0x7f0000000a40)) r14 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r14, &(0x7f0000000d40)=[{{&(0x7f0000000a80)=@sco, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/33, 0x21}, {&(0x7f0000000b40)=""/177, 0xb1}], 0x2, &(0x7f0000000c40)=""/224, 0xe0}, 0x73065000}], 0x1, 0x2, 0x0) r15 = openat(r7, &(0x7f0000000d80)='./file0/file0\x00', 0x40000, 0x49) setsockopt$inet_tcp_TLS_RX(r15, 0x6, 0x2, &(0x7f0000000dc0)=@gcm_128={{0x606}, "a2c308e116f56231", "eae0c2a65c70ba43f256a4ac84263558", "0cfb855d", "33b8addd60cd2848"}, 0x28) 03:42:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000006980)={'ifb0\x00', r4}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000069c0)={r5, @local, @multicast2}, 0xc) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x7}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r7, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x788489362e84ec87}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x124, r8, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7f}, @IPVS_SVC_ATTR_FWMARK, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x1, 0x4, 0x6cf}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0xffffffffffffff8e, 0x4, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x8daa}]}, 0x124}, 0x1, 0x0, 0x0, 0x4040}, 0x40) write$selinux_user(r0, &(0x7f0000000000)={'system_u:object_r:wtmp_t:s0', 0x20, 'sysadm_u\x00'}, 0x25) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r9, 0x6609, 0x0) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000040)={0x59, @loopback, 0x4e21, 0x2, 'nq\x00', 0x2, 0xfffffeff, 0x21}, 0x2c) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@address_request}}}}, 0x0) 03:42:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:46 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 802.677483] selinux_nlmsg_perm: 37 callbacks suppressed [ 802.677496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28005 sclass=netlink_route_socket pig=24376 comm=syz-executor.3 [ 804.114527] kauditd_printk_skb: 339 callbacks suppressed [ 804.114535] audit: type=1400 audit(2000000569.030:57569): avc: denied { map } for pid=24392 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:49 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 804.187081] audit: type=1400 audit(2000000569.060:57570): avc: denied { map } for pid=24393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='\x00\x11@\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="2009000000000507000000000000000738562200", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r5, &(0x7f00000017c0), 0x35a, 0x0) getpeername$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x210007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="40000000100005000081ff000000000000000000d7317cff041ae01093504ec3e47207c0f2a5c0b68a54361dbabde173ef66a81d9a5d8adb0092366000"/71, @ANYRES32=0x0, @ANYRES16=r8, @ANYRES32], 0x4}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x35a, 0x0) clock_gettime(0x0, &(0x7f0000000680)) clock_gettime(0x0, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r9, &(0x7f00000017c0), 0x35a, 0x0) accept4$packet(r9, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14, 0x81400) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="40000000100005070023d5607fb02242d93194d3eac69a99d40000810000000000000000", @ANYRES32=0x0, @ANYBLOB="deb8aff13c8463aad364e30a2159e19a3970c68234d9aa3b8705be7110ab", @ANYRES32=r12], 0x4}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYBLOB="000000000000000020001200d86a39b42498790614000200080011000000000008000200", @ANYRES32], 0x40}}, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000005000)={{{@in=@broadcast, @in=@initdev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xfffffffffffffd89) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@dev, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000005340)=0xe8) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r15, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:42:49 executing program 0: socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) syz_genetlink_get_family_id$nbd(0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x0, 0x300) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) ioctl$PPPIOCDISCONN(r4, 0x7439) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x3, 0xffffffffffffffff, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0xfffffffffffffc21) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x8, 0x7}, {0x80000006}]}, 0x10) 03:42:49 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:49 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x1c1842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000f80)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x8}, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) accept4$inet(r5, &(0x7f0000000e00)={0x2, 0x0, @loopback}, &(0x7f0000000e40)=0x10, 0x800) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r5, 0x1c8, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x2002}, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x9}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xb31}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)='-\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000180)='/selinux/mls\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r4, 0x0, 0x1f, &(0x7f0000000000)=':vboxnet1!vmnet1\'keyringem1em1\x00', r7}, 0x30) ptrace$getregset(0x4204, r8, 0x201, &(0x7f0000000080)={&(0x7f0000001140)=""/4096, 0x1000}) getresuid(&(0x7f0000004180), 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) r9 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40042409, 0x0) [ 804.277346] audit: type=1400 audit(2000000569.060:57571): avc: denied { map } for pid=24393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 804.374627] audit: type=1400 audit(2000000569.060:57572): avc: denied { map } for pid=24393 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 804.508027] audit: type=1400 audit(2000000569.070:57573): avc: denied { map } for pid=24392 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:49 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 804.643590] audit: type=1400 audit(2000000569.070:57574): avc: denied { map } for pid=24392 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 804.826799] audit: type=1400 audit(2000000569.070:57575): avc: denied { map } for pid=24392 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:42:49 executing program 3: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/unix\x00') fcntl$setstatus(r1, 0x4, 0x6100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) prctl$PR_SVE_SET_VL(0x32, 0x3e383) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) getresuid(&(0x7f0000004180), 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 805.006146] audit: type=1400 audit(2000000569.080:57576): avc: denied { map } for pid=24393 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 805.143059] audit: type=1400 audit(2000000569.080:57577): avc: denied { map } for pid=24393 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 805.241309] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.259907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24426 comm=syz-executor.1 03:42:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:50 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 805.903347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24426 comm=syz-executor.1 03:42:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:51 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7f, 0x4601, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a77, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r4, 0x0, 0x0, 0x0, r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)='-\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000000740)="834fcb65a6c46d16ef2052faf04ccdd92849a82a213ac32ec6c82981f5f0471754e8ed51cb84c5e4f539ca795abab25e012351ea4f29f600380df50795fc22791387f1396a5e145e9cc6347d9af28bac8b9777324101fe182ae362617c7d682d8502d03dd3eac80bb3d5640fbd45cabfa311b3e9319f294a0e3a44b6c3558b9e9887891dd5ba1d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0xffffffffffffffff, r2, 0x0, 0x7, &(0x7f00000005c0)='bdev\'-\x00', r5}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r5}, 0xc) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="5000502f71a88e2f1d0400004485d6a452ca8d4803d0aa3884bf82691d610e82f1593edef7cb1865811331fa369bc2153661ad7c8f683e57543e13121b07fac144801c3f129950387e028cb5eb3d34e44818841b1b604c63b5fb29bae44dc8991a9ba10000000000000000000000000000a0a16f3d6c1dd9180a7db848c1fafb685f5868061a5a0f173a9d50b47407c83dff5a58f482edee7379cbbd305dee8649db314bc7c290ee3c73e92c256bd53f9c8952d58fb4dee9376eb974b1ca8c47afa3f5a81774b73672cb452a1e21cf19332e6bfcea467f0e262bf8d5adaa37ca99418f121734b68b2183ab3ba47ad9a20b878ba0b5f8b170528e1db31b931a4440fef563fcb6b6570c99", @ANYRES16, @ANYBLOB="040525bd7004fedbdf25010000006208470800040001040000140007002aa434d42a9b9b2e24105681b22476256ada080002000200000080680000000000000000aee454200fc1eeb8946532a9b236c4c7a6de1dc346c0a070d73b2a3acb315b8db0d7319ba43e8bb0e5fba67cb868512d5751b948f04d14a0fce9ee0eba77472bb9de9fe42f213da7cdc09678101f25492dbf2b15d65abb05066dba097ec05d3b04e2505511841cd1f868ceb30d83fcaaf33b000023be178465c4c30f680bc1f6b47fffcbcb48bc468aa37394a271668f44"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8000) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)='./file0\x00') setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x87, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0x0, 'lc\x00', 0x0, 0x4, 0x5b}, 0x2c) 03:42:51 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/create\x00', 0x2, 0x0) socket(0x40000000002, 0x3, 0x2) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ptrace(0x10, 0x0) ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f00000000c0)={0x0, 0x1000000}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="100000000100000001000000443d00d7fa22e46f70b0f2606b67b58a80fea5c5960b8100d6a648cd11976836ffa9c0f12b4ed328778d1dff9f269110576644df4bbbc66fc8437e000c5e00"/88], 0xf}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001680)={{{@in=@local, @in, 0x4e24, 0x80000000, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0xbe}, {0x9, 0x50b, 0x1, 0x7f, 0xfffffffffffffffd, 0x4, 0x3}, {0x4, 0x9, 0xffffffff}, 0x9, 0x0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1}, 0x4d4, 0xff}, 0x2, @in6=@local, 0x3502, 0x4, 0x3, 0x200, 0x9, 0xffff, 0x1ff}}, 0xe8) r4 = add_key$user(&(0x7f0000000400)='user\x00', 0x0, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) r6 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r6, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) r7 = socket(0x40000000002, 0x3, 0x2) sendmsg$unix(r7, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) sendmsg$TIPC_NL_LINK_SET(r8, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x4000004) ioctl$TIOCGSID(r8, 0x5429, &(0x7f00000005c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8210000000000000081951863c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a12728c86ba4091ebfe1d07d497540f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a"]}, 0x0) getgid() add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) socket(0x40000000002, 0x3, 0x2) r9 = socket(0x40000000002, 0x3, 0x2) sendmsg$unix(r9, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]}, 0x0) 03:42:52 executing program 3: syz_emit_ethernet(0x50, &(0x7f0000000000)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "000001", 0x1a, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x28, 0x8dfffffffffffff5, 0x0, 0xfe03, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @tipc=@payload_conn={{{0x1a, 0x0, 0x0, 0x1, 0x1, 0x40000000000000b8, 0x2, 0x2, 0x800, 0x0, 0x2, 0x3, 0x7, 0x0, 0x7ff, 0xfffa, 0x0, 0x4e24, 0x4e21}}, [0x0, 0x0]}}}}}}, 0x0) 03:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:42:52 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r2, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10330402}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4814}, 0x8004) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000040850000000d000000b70000000000000095000000000000006c42a8eace204cc17d845d2d25e6566995604cce954e16dbf34cf0be2b25f0d64a84b22093d284c7b8a9044d384b2303747f70ebb92b3044bfba3c162afcd09b047fb56f733c52c4137634032bedd539f4a29eb56dde8b40b923f3ef64dd868ca8e37907c13374387331057896db13d100c13790ac61ec55d1da4b49b83ce7e9687a98fbfe4298305756b9cd8f32836c354bac4025843976b110d77b53cca94be8400ea9c25b3a2369f18057f228df0789958edb01363dd014a64cee873ff19b416baa5dd38fcbaaf425ed2ba21d525403b2a52d6f286f36ca7cd0235af0a93bd61644eb2b7f4b73e5e5382f178dcd9b2636ecc41fd8f1d682c5460adce630a7b0d3216abbfb5f700978731ed1e7e554707e0d183671c86f4cad6c3521acb77ccb9ec189ea3c0b788a71f9f801eed64a5395006563045356e403450cf33abb2ab92e065ad661f188aeb45b8fc4805a599e9e4c9d5f45d664beb5dc67892a5cec16d9f75da7433c7a075e999ea66f0db2605d91f95ef3461a14a6ffaa842f6311b5ac90809678cdf182133e891cc2134e5389532ace1dd5b154ae97861266aa230433"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x1800000000000060, 0xe, 0xffffffffffffffbc, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28) 03:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:42:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0xd}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) capget(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) openat$selinux_member(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x40) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl(r1, 0x100000001, &(0x7f0000000100)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r2) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="6c65f93912fe21b194fc9788e3d58deb28f7e88aa6cf18151d102b31f64e6738e65809368e8f143e0407") r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lsetxattr$security_evm(0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="711df4b5bf7ab213b4ec0b3773e83a0d2ba5b4fd269c99618df18a3db9e60c128de755d16c50053bbb3889d1581dd19d7f11816e186c2e7edb16a8b06f3c1c15dbc2f710ec03e024364f3d2fb1eaa3408f11a20f550cf48c6204656b2a6e6f1ab48469957b04609d34b5442707e3cf06c3db6ba4210dfcb3d58dee0daeda424ca7fd", @ANYRESOCT, @ANYRES64], 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) keyctl$setperm(0x5, r4, 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) 03:42:53 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:53 executing program 1: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x7}, 0xf) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$VT_RELDISP(r2, 0x5605) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x90400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[], 0xffffffffffffff11) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) pidfd_send_signal(r5, 0xa, &(0x7f0000000240)={0x0, 0x5, 0x8}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) r8 = inotify_add_watch(r7, &(0x7f0000000080)='./file0\x00', 0x40000000) inotify_rm_watch(r6, r8) 03:42:54 executing program 3: socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) add_key$user(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000100)="8f", 0x1, 0xfffffffffffffffd) socket$inet(0x10, 0x3, 0x0) 03:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:42:54 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:54 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:54 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001800110300000000ffff00090008002000000000aecf0dad5913524c0f467ac0fc7e1d4a14334e321513291cf6a2faa4186c6a1a770a2a8bc8efcfa3d3ad2c2f6de27b6c7be8670ee6276ad061669af6777839d44b53492f40863d417c68f6847ce6e1d605222a45c65bdcd24d456a4e00004000e0", @ANYRES32=0x0], 0x28}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000200)={'bond0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') rmdir(&(0x7f00000002c0)='./file0\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x249005}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r5, 0x200, 0x70bd28, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10004000}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 03:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 809.407244] kauditd_printk_skb: 307 callbacks suppressed [ 809.407255] audit: type=1400 audit(2000000574.320:57871): avc: denied { prog_load } for pid=24510 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:54 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 809.719165] audit: type=1400 audit(2000000574.630:57872): avc: denied { map } for pid=24517 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 809.796957] audit: type=1400 audit(2000000574.630:57873): avc: denied { map_create } for pid=24516 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:54 executing program 3: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x16, &(0x7f0000000100)) getpgrp(r1) perf_event_open(&(0x7f00000001c0)={0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x68}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x88, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0x400c92d, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x80000, 0x0) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0x0, 0x6b19, 0x1, 0x7, 0x4, 0x80000000}) 03:42:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x8, 0x4b, 0x3, 0x2}, {0x3, 0xfb, 0x8, 0x9}, {0x8, 0x8, 0x1, 0x1000}, {0x3, 0x0, 0x6d, 0x6}, {0xfc32, 0x4, 0x8, 0x8}]}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="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", 0xfd, 0x4000000000000000}, {&(0x7f00000002c0)="126415f70f7962dc2eebad1fbbf27b488ce119ece499ec0cf49df3b4892d95d12a54f21f98b78cc1843247db60a4048e99a27fb011b74c005700f0a02acf45a592e3739fe7be13a14729be3b57c4fad06f29b0f2261382e9ffe344481cd221fc6c841349e4e26b5cd2c47199c4da7f3e5d4c9a9f3ee16c3a83cc8803c59fc686c69cfc7c438123ab1d3e1f009d7629f1a47609f514c740d66c87defafd81", 0x9e}, {&(0x7f0000000380)="d5b2cae96e6847faff96c8f921ebc256e54f", 0x12, 0x8001}], 0x1028012, &(0x7f0000000440)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x20000}}], [{@smackfsroot={'smackfsroot', 0x3d, 'selinuxem0trusted-)$vboxnet0vmnet0v'}}, {@uid_eq={'uid', 0x3d, r2}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trusted'}}, {@subj_user={'subj_user', 0x3d, '}$ppp1'}}, {@obj_role={'obj_role', 0x3d, '\''}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 809.921455] audit: type=1400 audit(2000000574.660:57874): avc: denied { map_read map_write } for pid=24516 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:42:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:54 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) [ 810.035195] audit: type=1400 audit(2000000574.670:57875): avc: denied { map } for pid=24517 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.194795] audit: type=1400 audit(2000000574.680:57876): avc: denied { map } for pid=24517 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.322036] audit: type=1400 audit(2000000574.690:57877): avc: denied { map } for pid=24517 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.434993] audit: type=1400 audit(2000000574.710:57878): avc: denied { map } for pid=24517 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.563885] audit: type=1400 audit(2000000574.760:57879): avc: denied { map } for pid=24517 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.696189] audit: type=1400 audit(2000000574.760:57880): avc: denied { create } for pid=24516 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:42:56 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141045, 0x0) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB='#'], 0x1) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x4000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) write(r2, &(0x7f00000002c0)="87ca16f37a60d75c5af022f5589af931bc31ca00d02452a755b1edcf76f03dafa7be5b266e091480df92dde22fb6b6a570b70ae85f0a8dee6747705688f47fd52bcedb437f5548ff420d44283f2bed9982b7b296d5b8cd098c6f62da59d98a5216c28ac828530a89c80c02b39b08011f4b00ff41bbb62fa62d08941e1332f59b1b973cbf75b5d3df959f747452e10039a80e14c35915bf3fa99e2fe22ab8342268c0341214251be025883295b7b860e7e26b850e6c73fb7930c1", 0xba) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x2, &(0x7f0000000280)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 03:42:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000700)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000800)='\x94\x1e\xa9\n\x00\x00\x04\x82\x96\xd1\xbe\xd4\x1e\xb1\xf4\xda\xc55VLi(\\\x89\xf9G3\xbf\xd3\x94\xcd\xbf\xa3\xedcXa\x98r\x83\xf5R\x88\xf2nzn\xc1\xd1{~zc?\xb3\x9cJSz\xf0\f\x965\xd8s\x0f;\xcd3\xb7\x8f_1\xbfw\xaf\x93l\x86)\x9b\x80\x89\x12\xe7\x010\xa70Rp\xd9K$\x8a\x10\xf7\x00\xd9\x0f\r\xa8\xef<\xe73g\a\xfd\xd8\x93\x8c\xb5\x1b\x81v\xbf*\xc9V\x94\x01b>\x0e\xe6\xa77\xfe\x80\x8b\x92\x89\x9cSJ\x9e^\x15\xb0\xd9O\x7f^Y\xff\xb02\'wX\x85\x8e>\x8e\xb4\xdc\xa2\rs\x1ay\xcd?\x92f\x8d=)Ao\xd5\xad7\xe5\xef\xe1\x04\xdb\xce\xd21\xc1\xd34\x8ay\xcbY\x9e\x92&4\xaaW|m\xe2\xb5\xa4\x85\xe57TDQFJ\xc8\xecC)\x15\xb4\xfe\xfc<\xc2\xf5m\x15v\x1a>e\x95\n\xd0\x89\x15\xa3\xbf&\a\xa6\x81\x86\xe3b\x83\xf8T\x82\x99\xb5\x89]\x19\xd5\xacu/~\xab\xc5.\x1a\xcd\xc5\xbc*\xb1\xbe\xbdA\xf5,\xb0\x86\xf9k\x8ck\xc21\xcbFM\x18\xae\xa3\xe0-\x82j_\xfe\x8dn\xc6b\xe0\xc3\xbd\xf7\xc3\xd5\x10\xc0h\xecWT\x12\xcb\xb8\xc85\xb7F\x03#x\xa3\xaa(\xe1XT\xdfH\xb4^\xc6E\x7fw\x93-b\x96S\xe0\xf8\x8a\x836h\x01\x97\xd9\x8d\xeaF\xe6l\xb9U\xbb\x92\xd4\x97M\xae\xf3\xa0\xdf\x14\xcbS\x11\x83\xa7\xf7\x04\xca9\x80\xe9:0$\xb4\xa1\xfd\"g\x98*\x13\xc9\v\x96f\xe3B\x9es\x82\v\x89\xe4\xce\x1e\x98\x9fC:8\x9a4\x83?\x95\x8e\xbc\x82\xec\x90\xb2\x92\x86y8\xfe~\x96\xe5#\xb1\t3!\x8dn\x15\xac\xb6\x98z\xb96P\xd3\xd3/\xb4O\x1c=\xcb\x80\xda\x01\xf3\xd63\x91\x06[\x06\xb0Ej\x13c\xa5\x84B\xeb\xb5f\xf4\xe8-2f/\xba\x17\n,\x02[\x7f\xe2a\x81|\xbd\x81JFj\xec8\xf5\x1eg\xd2s\x8d\xd0\x1d\xa2wb\xf6\xaf\xc8\xb4\xf7pk\xc3\x7f#z\xb3\xa9\xf8)\xdbb$\xf9\xd7t{-\xf9;.\xaf\xf9\xe6{\xf0F\x87PG[\xdc\x8d\xbe\x93t\x92\xec\xc2\xcc?\x86\xec\xa1W\t\x97]\x90@a\xd2N\xd9\r4@b\x87\xaf\xday5\x88\ng\f\xd2\x14\xb4\xde\f\x13\xeb\x87\tK\x14\xc2\xc6f\x06\x02\x8ay\xcb\xd7\xd5\x9b=P4\xbf\xed8e\xa9\xe0\x11\xb7\x16\xd1\xfd5Nb\x1c\xd0\x04E\xa2\xca\xc7\xb2\xf2\xf5\xee\xc0\xde\xf8#v\xe5\x8a\'/\x04\xb5#\xdc\xb0x3\x85\x85\x83\x9e\xa5\xad\x93\xe7t\xae\xe1\xd4\x82\x9b\xe4q\x01\xad\a\x04\x8bj\xa4s.OW\x17\xf2\xce\xa5!^\x1f\xc0\x1e\xa1\xa4\x84\x1d7\xe3\xe5\xf6S', 0x1020004, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x5, 0x3}) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:42:56 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) setresgid(0x0, 0x0, 0x0) 03:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:42:56 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:42:56 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:42:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:42:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) r5 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="148120024700000704256606000004000000002291aed3dc486e4511227bc0287ad65398b3010000007f89b3382003777e005e9529f01080c8243ca5069b8645279ede4948000000000000000000000000000000000000acf9933fe681752a5c88015cf63318471addd8e2eb3f4b6f7b01aa005b37069328c7a680dbb290f371644a35a7a5a478587c9fb47e19929c9ff5de50"], 0xfffffcb7) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x308, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000f464bf382bcb5babec0e56d7a721c5b50c847b3dc482f976cba5f53d5b7c1845cf2cd333df92db8cb0ae9685ae4fa7e5190013318f72003f3044dc8ab166fb5ad8c98189e1a762dc0ba41cf772e11f3a1db7480753d4bd6fb738b70948900292a2e0148203062d"], 0x28}}, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x500, 0x20) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) splice(r1, 0x0, r3, 0x0, 0x20000010005, 0x0) 03:42:57 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 812.657257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=71 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.725051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.777640] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.842952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.905128] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.948861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 812.982627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 813.058874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 813.116715] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 813.164419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24578 comm=syz-executor.3 [ 814.572604] kauditd_printk_skb: 216 callbacks suppressed [ 814.572613] audit: type=1400 audit(2000000579.490:58097): avc: denied { map } for pid=24604 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.601492] audit: type=1400 audit(2000000579.490:58098): avc: denied { map } for pid=24604 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.623923] audit: type=1400 audit(2000000579.490:58099): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.648303] audit: type=1400 audit(2000000579.490:58100): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.674148] audit: type=1400 audit(2000000579.490:58101): avc: denied { map } for pid=24604 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.697101] audit: type=1400 audit(2000000579.490:58102): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.723471] audit: type=1400 audit(2000000579.490:58103): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.748368] audit: type=1400 audit(2000000579.490:58104): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.775093] audit: type=1400 audit(2000000579.490:58105): avc: denied { map } for pid=24604 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.799679] audit: type=1400 audit(2000000579.540:58106): avc: denied { map } for pid=24605 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.581478] kauditd_printk_skb: 1035 callbacks suppressed [ 819.581487] audit: type=1400 audit(2000000584.500:59142): avc: denied { map } for pid=24719 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.609399] audit: type=1400 audit(2000000584.500:59143): avc: denied { map } for pid=24719 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.631734] audit: type=1400 audit(2000000584.500:59144): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.656065] audit: type=1400 audit(2000000584.500:59145): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.682844] audit: type=1400 audit(2000000584.510:59146): avc: denied { map } for pid=24719 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.705810] audit: type=1400 audit(2000000584.510:59147): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.732213] audit: type=1400 audit(2000000584.520:59148): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.757187] audit: type=1400 audit(2000000584.520:59149): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.783068] audit: type=1400 audit(2000000584.520:59150): avc: denied { map } for pid=24719 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.807603] audit: type=1400 audit(2000000584.570:59151): avc: denied { map } for pid=24720 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:07 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2, 0xfffffe5f, 0x0) accept$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0x4) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) execveat(r2, 0x0, 0x0, &(0x7f00000004c0)=[&(0x7f0000000200)='security.capability\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f00000003c0)='#! ', &(0x7f0000000400)='\x00', &(0x7f0000000440)='wlan0&\x00', &(0x7f0000000480)='self\'\x00'], 0x1500) ptrace$getenv(0x4201, r0, 0xd0, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) 03:43:07 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:07 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:07 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x1, 0x0, 0x3f) lseek(r0, 0x0, 0x3) 03:43:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r5, 0x0, 0x30005, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) sendto(r1, &(0x7f0000000200)="51a0a2b51b3abb9be897f00d78ef7c31fcbb3ccaa2c82636919d903a2962e498cfc7f2877b1e98060a813050a175040e22f5f94d08e78bf1d68d9e77cbead1d2fd48bd38566d514d24a101aa572061cbfa023d8fae4d76df3135dee7f997c75bd7b1dc92c5bbc2ce4f8f66db3a0074c8a7211a3161d9ce35170e63f67094f405eea66ef259b9397058a3a6d090de7299883c38cb5a024d7a50cc98cc70dd83744b80713d47423760cf04b67926789f33a55ffef395dd6857daba2b02", 0xbc, 0x40001, &(0x7f00000000c0)=@in6={0xa, 0x4e20, 0x8, @loopback, 0x7f}, 0x80) 03:43:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:07 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) capset(&(0x7f0000000100)={0x20080522, r0}, &(0x7f0000000180)={0x1, 0x20, 0x8001, 0x80000000, 0x55, 0x7949}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000000)=""/81) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000080)=""/5) 03:43:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r2, &(0x7f0000000440)=[{{&(0x7f0000000180)=@ethernet={0x1, @broadcast}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)="2c12185eac4caf4a8bead2dd222b5deb7a8e7ed118c9749b7c9c81b19e43bc03d79bcc4214806af8ae5f53a001f9b978358a5ecf705f61ddf83486981f03a6f23e6043a7f134ddff", 0x48}], 0x1, &(0x7f0000000280)=[@timestamping={{0x14, 0x1, 0x25, 0xb}}], 0x18}}, {{&(0x7f00000002c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="d52c4249f0047288f2b13e9332f98fb66b381885928c58526cbb95db2239ecbdd52782255de4d0659dc70439c78176843d4e0ce7d154d6f9fcc5a9bc8960dd7062f425d6b3fc70f10cd1edfa839be62fc13e737ff740431aa15e0623e763919e9c83dda7fda6f416f88e4cfa687fb0070d4445fa12f2e812d6238512a10fa60592ab063f46bd3db6842533ba7d8cedb3e8d7125812e4", 0x96}], 0x1}}], 0x2, 0x20080) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000000)="87ca24399c00a8efc128", 0xa) 03:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:08 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000007c46b0ded38d0040000080000000000000006d5ebe5a0000ff0000ef", 0x40, 0x400}], 0x201c861, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x13}, 0x10) 03:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'b\x14\x90\x10_slA\x97\xdc\x8f\x00\x00\x00\x00 ', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'lo\x00', 0x4168017ae0bb6cc7}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'rose0\x00', 0x200}) 03:43:09 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f000000b0c0), 0x283, 0x40, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="00e69600fca9e6b27c35833e4d618a34638cc16a510000000000ccf3048133d7a6d24d87f5705d6aafcb4ca802d4ebad0500000000000000f7aaf7979e7daa7d1bf41e60d1ec6217b714e991b62db03bd4e376c168cf09b942cd19d719f53e281274bd219fb3977db509edda2b702f9030b09cfb8e1b5735e6371352c942983a3412e3c3ecfb831089c1ebb1b1e6fbba2d354774e68b302b23be7a6ee372d67b22ef4cac2ef711e2e4de8735ce1c08351455bbe940b1b0e6"], 0x1a) fallocate(r4, 0x3, 0x0, 0x8020003) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) writev(r5, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}}, 0x0, 0x0, 0xffffffffffffffff, 0x866bdb9e757af142) close(r6) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2d337334bf6f4dfd, 0x10010, r6, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r9, 0x6609, 0x0) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) lseek(r10, 0x0, 0x4) lseek(r4, 0x0, 0x3) r11 = getpid() r12 = getpid() rt_tgsigqueueinfo(r11, r12, 0x16, &(0x7f0000000100)) fcntl$lock(r6, 0x7, &(0x7f00000000c0)={0x2, 0x3, 0x0, 0x7, r12}) ioctl$KDSETLED(r1, 0x4b32, 0x0) [ 824.594486] kauditd_printk_skb: 372 callbacks suppressed [ 824.594496] audit: type=1400 audit(2000000589.510:59524): avc: denied { map } for pid=24809 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 824.753205] audit: type=1400 audit(2000000589.520:59525): avc: denied { map } for pid=24809 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 824.890289] audit: type=1400 audit(2000000589.540:59526): avc: denied { map } for pid=24808 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:09 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 825.098329] audit: type=1400 audit(2000000589.570:59527): avc: denied { map } for pid=24809 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 825.256077] audit: type=1400 audit(2000000589.590:59528): avc: denied { map } for pid=24808 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 825.460659] audit: type=1400 audit(2000000589.600:59529): avc: denied { map } for pid=24808 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) flistxattr(r1, 0x0, 0xfffffffffffffff8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memoyy.eve\xa7\x8b\xfbnts\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000cc0)={{{@in=@initdev, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r6, 0x8) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="0100060900a18b69cc2bf4aabaaac8aa319a3c45232d0a39c421aaaaaaaaaafbffaaaab26ebdc257b4"]) r8 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r9 = memfd_create(&(0x7f0000000600)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x8) pwritev(r9, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x13, 0x0, 0x0, &(0x7f0000000080)='GPL\x005t\xea\xdca$\r\x01\xf4\x10\xfd\xf0\xcc*\xf3r!\x04\xe5\xc1@\xf8\xee\xe2\xab\xe2\xc7s\x04\xc1y\xe7\f\x9a\x7f\xd9\xb2\xfb\x03\xf0\xe6\xc3O\x1ai\xa6\xc0\xfd\x9f\x8b\x13\f\x13M\xaf\xf1\xd0\x81Z?F\xfbM-^a\'\xed\xfe\xcc\x9b_\x83\x99f\x93C\x8f\'g\xaeq\x92GFu[\xf5\xd5\xf0\x924(\xe1\xdc\x81\x86C\x7f\xb1\xc4\xfb\xb3e\xa4\x94\xfcYI\x03\xaf\x19\x9bp9-PG\xe5\xf8{v\xe0\xbb\xe4\xef[\x9b\xc3\v\xc6;4\x18\xbb\x83\xdc\x13q\t`\xf1X!\xf5\xb9\xdc\xf6 \xc4\x04\xbe\x14\x16DI\xa1<\x97\xecb\'>f\x8c\xd0\xb0e', 0x0, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100026}, 0xc, &(0x7f0000000080)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="a00300001200010028bdcddb0000000000000000", @ANYRES32=r10, @ANYBLOB="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"], 0x3a0}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = fcntl$dupfd(0xffffffffffffffff, 0x0, r11) ioctl$sock_inet_SIOCADDRT(r12, 0x890b, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@empty, @in=@empty}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xfffffd5a) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, r9) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) sendfile(r7, r8, &(0x7f00000001c0), 0x20002000005) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000c80)={'veth1_to_hsr\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="200000003b00efffb0dc9874e37835be8d1b8de1f0d18ebf89e17bce1fdbf814f7d5f68717509f2e6a45896a8b8b671fb364d5507d"]}) ioctl$LOOP_CLR_FD(r8, 0x4c01) connect$inet(r0, &(0x7f00000000c0), 0x10) [ 825.673219] audit: type=1400 audit(2000000589.620:59530): avc: denied { map } for pid=24816 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x0, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:10 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 825.813047] audit: type=1400 audit(2000000589.630:59531): avc: denied { map } for pid=24809 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0xfffffffffffffef4, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='r\xa9=\xb1\x82\xab*#\x97\x00\x16\x0f\x91\xa1\xbe\x9b\x14\xc0\x06\x19\xdc\xae\xf8~\x1eH\xb2X\xf4\x01\xd7>\x13F)\xa9\x9e7\x18\x8d%\xb4\\\x8a\r4\xc8\x87G\xab\xe2\x19Ip\xf1\r\x1e\xd5\xa45\xd8\x8a\x00\xbe\x1fzo\xe4\xc1\xf4\xa5\xa1|,\x8d\x85%\b,\xac', 0x0, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000001580)=""/203) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x100000000000000) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="900000000000001e07fc619a3d8b42cff0bb9be0a7e4746916cc4e35aaab73646551d79fbbf600e518eb3a516f9686cf00f20b5a655852925bd359a115c8fa250b5e1870a312f5e5d54b73760f68ca21c9cb742e165e13ff4fe199725dcaacab8432cd407d0228c05c3019a597f4c961bce5103c04177275dedb3f33b6a36775feafad551de70841ef539c344ac58f5bdcf90eff023d538826f532eafd57171d92bf02ec979459d0a6fd10225d1775d22d94c7364c8066019cbb5e380a3b352deedaeceedc351d6d983e09148e7500"/229, @ANYRES32, @ANYBLOB="0500000066d32da68a8fbf11"], 0x24}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000400)={{0x1, 0x0, 0x1f, 0x3, 0x1f}, 0x1, 0x0, 'id1\x00', 'timer1\x00', 0x0, 0x8001, 0x89c4, 0xffffffffffffff85, 0xffffffc1}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') gettid() r5 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r5, &(0x7f0000000240), 0x14) [ 825.933454] audit: type=1400 audit(2000000589.640:59532): avc: denied { map } for pid=24816 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x0, "2795821233b552b71710c7f6"}, 0xe, 0x1) 03:43:10 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x40) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x5, 0x8dc, 0x3, 0x8000, 0x2277}, 0x0) [ 826.132039] audit: type=1400 audit(2000000589.650:59533): avc: denied { map } for pid=24816 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x0, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:11 executing program 5: creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x1}, 0x14) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 826.874350] selinux_nlmsg_perm: 70 callbacks suppressed [ 826.874396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24857 comm=syz-executor.3 03:43:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x0, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 827.508504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24867 comm=syz-executor.3 03:43:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) r5 = accept$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) sendfile(r3, r5, 0x0, 0x78) r6 = socket$packet(0x11, 0x3, 0x300) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) write$P9_RREADDIR(r7, &(0x7f0000000100)=ANY=[@ANYBLOB="a60000002901000080000020040000000200000000000000c400000000000000ff07002e2f66696c65304e0100000008000000000000000400888d000000000507002e2f66696c6530040100000008000000000000000400001b000000000107002e2f66696c653000000000e1e17fad859590119d385b5681ae0000000000000000007d000000000000009c07002e2f66696c653010000000000200"/166], 0xa6) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x4000000028, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, 0x0, 0x0) write$P9_RREMOVE(r8, &(0x7f0000000240)={0x7, 0x7b, 0x2}, 0x7) 03:43:12 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e24, 0x6, @loopback, 0xe15}, {0xa, 0x4e24, 0xd2, @local, 0x8}, 0x7, [0x800, 0x20, 0x1ff, 0x6, 0x7f, 0x2, 0x0, 0x4]}, 0x5c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000040)=""/90) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000ff14d1d081057cad698dff0400000000000000000000000000000000000000000000000000000000000000000000000000000000001100"/113], 0x68) setresgid(0x0, 0x0, 0x0) 03:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:13 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000200)=ANY=[], 0x5aa78d33) write$binfmt_script(r0, 0x0, 0x0) close(r0) 03:43:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="6000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=0x6, @ANYBLOB="380012000c000100697036746e6c000028000200080001800000000004001300080014000000000008000f000000008398949ada7578b8ed"], 0x60}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = syz_genetlink_get_family_id$team(0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f00000096c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000226bd7000ffdbdf2500", @ANYBLOB="bc00020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004004300000008000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040001000100400001002400010071756575655f696400000000000000000000000000000000000000000000000008000300030000000800040000000000080006", @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffbffff3c00010024000100656e61626c656400000000000000000000000000000000000000000000000000080003000600000004", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="f800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000410203000b0000004b0104000900000008000700000000003c000100240001006c625f74785f6d6574686f640000", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005e0f0000", @ANYRES32, @ANYBLOB="c800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000044000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000007a0304006163746976656261636b75700000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES16], 0x1d}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'nlmon0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB], 0x3}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r8, @ANYBLOB], 0x3}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r11, @ANYBLOB], 0x3}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'veth0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400004a}, 0xc, &(0x7f0000000840)={&(0x7f0000000440)={0x3fc, r2, 0x0, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x230, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x39, 0xd4, 0x8, 0x2}, {0x31, 0x2f, 0x9, 0x700000}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r11}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r13}, {0x128, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfff80000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xda}}}]}}]}, 0x3fc}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) 03:43:13 executing program 4: unshare(0x20000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x0, r3}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x800000000000226, 0x0) dup3(r1, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0xc000, 0x0) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000200)={{0x2, 0x4e21, @rand_addr=0x208}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x4, {0x2, 0x4e24, @loopback}, 'veth1_to_bond\x00'}) [ 828.846030] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:43:13 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(r1, 0x0, 0xfffffffffffffdcc) setresgid(0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) 03:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 829.614085] kauditd_printk_skb: 253 callbacks suppressed [ 829.614093] audit: type=1400 audit(2000000594.530:59787): avc: denied { map } for pid=24922 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 829.649871] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:43:14 executing program 4: unshare(0x20000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KDSETMODE(r1, 0x4b3a, 0x101) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x6, 0x8}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2800000010005fba00000000000000000000000008b8d22c9a53057f06d2f71de71b22740ad3b41100454f33c77fc26c28aa0315ff1629f5fd78eb64267ba3d49d6ddca8ecf1cc54d13d86fab4dc7c19f3f06e8618671bcb867dab7a85957efa10f024e778325d328081c47efe4b2fad185b3c89da8a01ffc0c3e66880501deea6e96b1763753579ce04bd2885bec0ce8777b9c8c9b86659b6cfbf6c573b1c4f9a58bfd590", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b00000000008c5349b9f4bdc9b1fa8b95169ba0dd50b7eb0df68b7117a4941eb5c7b5302210c5cbfebfc3d9ffbc6a0eea5c3ea1038fd5b5e0ba72d3ba696315a240a9beb499f7cb2fbf4698505c2da632d2ee112d282e89e88d5e29098ee60f4ac77da4e1c704a6b82579595ae4d9949d962a8f626aa897e0e94ae7f747c5f094ac347323dd42efa4cc614a118fc7e5ea2c8529ec2a04a85f5d87b3e17ba0f972b127ef967b43"], 0x28}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e24, 0x9, @local, 0x7}}, 0x0, 0x2, 0x0, "170550ff0bea183cadba8435f6be61ff46fd57c2b89b5102bd73ec5edae0e94812312015f4ac909f166b7ee250ffbb7573be039831173cbe92a26500f9d2456f97f98a3841276c6b20f94ee14270a081"}, 0xd8) [ 829.819295] audit: type=1400 audit(2000000594.530:59788): avc: denied { map } for pid=24922 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 829.950201] audit: type=1400 audit(2000000594.530:59789): avc: denied { map } for pid=24922 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 830.141394] audit: type=1400 audit(2000000594.560:59791): avc: denied { map } for pid=24922 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:15 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setopts(0x4206, r2, 0x9, 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r4, r5, 0x16, &(0x7f0000000100)) rt_sigqueueinfo(r4, 0x27, &(0x7f0000000180)={0x31, 0xca, 0x4}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) sendmsg(r7, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000300)="31ca04760e062edbc2fd5a189de9faebf5b36d6a581beb9d6be0a0b4bbcb38c485d7e1dcba30a21ff78886468c85db9a17ec7bdc67d901e9c1b301d98eee6ef44032fdf4531480253cba2b667e75cd8b208b411f7fa7e5ce7aac1f242dd6eb1874e3c0fbeeaa42647fd6b8e1f0e9f913ba533e78519e6f4eedb03072a7e5f96aa7e1b70373ce88814d30d25c9de677be9fb70c9ff85b611c2ee794d767d13318dd0004b09aebdc3812adcb15d583b32db9738d5a9dcccd649e110c062bbcf472ac862f8e92dfc75bdefc9a8d6bd10ec7e0f5bb54b50af69b9ba68bf5749ff1cb281713b11b4caaf0ffe312df5d3f8254bda2da819d6250bfee8264d2eb2c", 0xfe}, {&(0x7f0000000400)="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", 0xfa}, {&(0x7f0000000500)="dd0ac0ae3d7867b5476ccc28ee2250b09f3a93579666e29a14eede42014cb4c59c5c248e59b2d22b987b23191c3e754ed0484ab6ab54ac040dee4ae0e24ddbd9ba1450f9459ac8931865b44d8c3b05c76ce0dfd309119dc35ec5e1f69438f5e762383dedea3c9a376f78f924e169931692b3eec7b030b781045dcfe038e5d23bfe63c6dfa0c092e7a5041f8c5fed4a0eff89a62d8d79dc5e11acdfd6655e76deb1ccd10bc3251b80e401eafc35bfb8ef64dc097d3b9e78c5a8197720afb9faef32dee4bad282382dd84dd70fc53b1073e8871204dc5591b4f74e9e30dabd5ad420", 0xe1}, {&(0x7f0000000600)="7d126caa829ca2bba85925ba203254344bc16a82566b86dac7068a60395f5f98bfac33f5c7be57053bccd36d0f967e4e08db45351ae57dd92e1adf45224bc1c2e62946aaf5f3eb79d06c1dc38d7d52e0e30ebdc9c73422ae0f90dd6619f95f5e68c7a157f40cd15cc03f8d5d2e77b72b7be2fc195307e8191f7868608867313a65d49d165954f1a185fad9fdc5b59bda313da5b37668578dbb", 0x99}, {&(0x7f00000006c0)="9ceb5be2173e3d9bea361ec349b4f92ddcc0e56935301406351d35f9228814cca0542bcecc82a22245", 0x29}], 0x5, &(0x7f0000000780)=[{0xe0, 0x3a, 0x3000, "7daecbb6a75166762abe22e019d2046ab4e99da127b2f3d8de30a2ea1c180846c4de6638d3f8a0832d9a382407397d7ce0ccda6eb94979e6732e48f3a07dd131db546be3feca32e0395c4e73052b9b094c57f712fecb20f4613337f325a92000f61ea2a32cb5a1a02cd5fa81414d83a6221a4d934e09d0b28504c66060072a951bde3fa7b713ceb060b5291aef0348fb680d23c1683cb160c5ad0771a581564d022e31c8ab7a216a67ef26f4a3e29844851f2fd63c7028079a1cbfc8a1486eb2043897f3ee39bf7659e944f48d03693e"}, {0x18, 0x10f, 0x10001, "36c3434a893417"}, {0x18, 0x107, 0x9, "fdc42c"}, {0x90, 0x100, 0x8, "2835df694601e726554726306a25b58f892a3b3a04294976d3ad203b68f82a1985d311d05308c884c9d687faedf13ba41042aaaf00ad4ae46bc6251e06a00cd3c7c69ee4988f29bfa240cd2f282ab3443a0b19bbfeb533c650a0a2b7ba97bd42da89127ef14423c378a7ccf9ba52d345ed0a755ed7f84ece2e68de3c298a283f"}, {0x100, 0x65af0a025834027f, 0x1000, "2ba79e4473ccb2ad32be99e700ddcdefe3b5ea74dc5a859e67eee7eac7f29cebc02545c61ed8761e0b5a336d957ee83101e53d2ecfe817b22903f85ef11cb54b525bdea5f1e7f264a5efb1675f0cfd4cf3abc927034acc307251489205a9973e6dd2450aced81b37575b90d83f9e82bc2bf857350e0016183354038a3a9d88d8e9deba8d097c7fa056d9c8da41002d2fda516aba68e1ee7a91a1048f83c46404e485fb9d124e6b3d3fe647138a8127c9b1210e4573bfb535cb80de8d4e39eaa7f438a194494106ddeddbaeddc390ad7ac6f344dad8d38c7b63ff7cf7f2092de556e023f35b17e8a52dc065a059bfd199"}, {0x18, 0x10b, 0xff, 'a'}], 0x2b8}, 0x4000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv4_delrule={0x40, 0x21, 0x300, 0x70bd2b, 0x25dfdbff, {0x2, 0x319dc9da53ebe17a, 0x14, 0x10, 0x0, 0x0, 0x0, 0x1, 0x18004}, [@FRA_GENERIC_POLICY=@FRA_GOTO={0x8, 0x4, 0x189}, @FRA_GENERIC_POLICY=@FRA_L3MDEV={0x8, 0x13, 0x9}, @FRA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FRA_DST={0x8, 0x1, @loopback}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) [ 830.318238] audit: type=1400 audit(2000000594.560:59790): avc: denied { create } for pid=24900 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:15 executing program 3: setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000000700009802000000000000980200", @ANYPTR=&(0x7f0000000180)=ANY=[], @ANYBLOB], 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0xda2083, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {r2, r3/1000+30000}}) ftruncate(r1, 0x8200) r4 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x7198a5e32ea85015, 0x103) signalfd4(r5, &(0x7f0000000300)={0xd1ec}, 0x8, 0x80000) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001080)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000dd00000000000000000000001b00000005000000d00d00002801", @ANYPTR, @ANYPTR], 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) [ 830.474172] audit: type=1400 audit(2000000594.580:59792): avc: denied { write } for pid=24900 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 830.546942] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.547069] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.560921] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.562512] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.743748] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:43:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x7, &(0x7f0000000180)='loself\x00', 0xffffffffffffffff}, 0x30) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x284800, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x81, 0x2, 0x7, 0x0, 0x12, 0x80028, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0xffffffff}, 0x2400, 0x0, 0x10001, 0x9, 0xda, 0x2, 0xecbc}, r3, 0x6, r4, 0xd) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) 03:43:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000180)={0x6, 0x8, 0x3c67, 0x99f9, 0x1, "0daa2fd4958547c791ddf9d011c7023673499b", 0x5000000, 0x4}) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) mkdir(&(0x7f00000001c0)='./file0\x00', 0x2b0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)=0x5) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000500)) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000540), &(0x7f0000000580)=0x30) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000200)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x24d8, 0x9}, {0x2, 0x3}], r5}, 0x18, 0x2) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000300)=""/229) 03:43:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:16 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) socketpair(0x0, 0x0, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300), 0xb800) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10010, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, 0x0, 0x810) connect$inet6(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001480)='/dev/null\x00', 0x4c00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) geteuid() sendmsg$IPVS_CMD_GET_INFO(r2, 0x0, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) ioctl$void(r4, 0x5451) 03:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:17 executing program 4: unshare(0x20000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:17 executing program 0: io_setup(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000140)={{0x0, 0x0, @reserved="a5bae5fa33101b8ab86abdf6ba25e0da89abd9c5289e4ba5e773311c4a7b2f27"}}) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x8, 0x20010, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r2, 0x77d, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x27faa413e9acff45, 0x4, 0x0, 0x2}]) 03:43:17 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) 03:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:18 executing program 3: pipe(&(0x7f0000000180)) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x101000, 0x20) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[]], 0x8}}, 0x5005c007) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000480)={0x5, 0x70, 0x4, 0x3, 0x4, 0xf7, 0x0, 0x1, 0x11040, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x101, 0x7fff}, 0x1, 0xb5b, 0x5, 0x9, 0x9, 0x3, 0x1f}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000600), &(0x7f0000000640)=0x4) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) write$P9_RGETATTR(r3, &(0x7f0000000340)={0xa0, 0x19, 0x2, {0x1041, {0x5a, 0x4, 0x2}, 0x42, r5, 0xee00, 0x7, 0x6, 0xfffffffffffffffa, 0xb5b6, 0x3, 0xa35c, 0x7, 0x8, 0x80000001, 0x6, 0x80, 0x1ff, 0x7, 0x8000}}, 0xa0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}}], 0x1, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYRES32=r7], 0x0, 0x158, 0x100}, 0xfffffffffffffe62) tkill(r0, 0x3b) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0xc0200, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r9 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$selinux_access(r9, &(0x7f0000000740)=ANY=[@ANYBLOB="73797374656d5f753a6f626a656374f4723a66736c4089829261646d5f657865635f743a7330202f7573722f7362696e2f637570736420303030303030303030303030303030303030303600269f79c4f65d14551548c8af07d3ceec47360d00e849443bbfcc2903356442521c5e1f2e060c4810d6eabcd0c53852d977f3d482c59a3fe3e65e1cc3e0ecaa940cdcd4ddb8e38448fbf77f85fc0018e792032888"], 0x47) 03:43:18 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = dup2(r2, r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000100)=r5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r6, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', r6}) r7 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket(0xb, 0x2, 0xc1) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:43:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xdfdbc7f3278ee7cf, @perf_bp={0x0, 0x5}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(r1, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73", 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0xc, 0xffffffffffffffff, 0x0) getuid() perf_event_open$cgroup(&(0x7f0000000480)={0x3, 0x70, 0x3, 0x8, 0x1f, 0x1f, 0x0, 0x6c10, 0x44008, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x20c0, 0xaf9, 0x3ff, 0x2, 0x5, 0x1ee, 0x6}, r0, 0x3, 0xffffffffffffffff, 0x6) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) unshare(0x20020000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x0) getgid() getgroups(0x2, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff]) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getegid() getgroups(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x90000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) setuid(0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) 03:43:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) write$uinput_user_dev(r0, &(0x7f0000000000)={'syz0\x00', {}, 0x48, [0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1691bb78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x6, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, 0x9, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 03:43:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 834.623203] kauditd_printk_skb: 284 callbacks suppressed [ 834.623212] audit: type=1400 audit(2000000599.540:60060): avc: denied { map } for pid=25040 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./control\x00', 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) socketpair(0x4, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000001500)='./control\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = fcntl$getown(0xffffffffffffffff, 0x9) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r16, 0x0) r17 = getegid() setresgid(0x0, 0x0, r17) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r18, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r18, 0x6609, 0x0) r19 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r19) r20 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r21 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r21) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r22, 0x40086602, 0x400007) write$cgroup_subtree(r22, 0x0, 0x0) r23 = dup3(0xffffffffffffffff, r3, 0x180000) r24 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r24, 0x40086602, 0x400007) write$cgroup_subtree(r24, 0x0, 0x0) ioctl$TIOCGPGRP(r24, 0x540f, &(0x7f00000017c0)=0x0) r26 = getegid() setresgid(0x0, 0x0, r26) r27 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r27, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r27, 0x6609, 0x0) r28 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r28, 0x40086602, 0x400007) write$cgroup_subtree(r28, 0x0, 0x0) getpeername(r28, &(0x7f0000001800)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000001880)=0x80) r30 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r30, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r30, 0x6609, 0x0) r31 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r31, 0x40086602, 0x400007) write$cgroup_subtree(r31, 0x0, 0x0) r32 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000018c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r33 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r33) r34 = getpid() r35 = getpid() rt_tgsigqueueinfo(r34, r35, 0x16, &(0x7f0000000100)) r36 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r37, 0x0) r38 = getegid() setresgid(0x0, 0x0, r38) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002c80)=0x0) r40 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r40, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r41, 0x0) r42 = getegid() setresgid(0x0, 0x0, r42) r43 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r43) r44 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r44, 0x40086602, 0x400007) write$cgroup_subtree(r44, 0x0, 0x0) ioctl$sock_FIOGETOWN(r44, 0x8903, &(0x7f0000003980)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000039c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003ac0)=0xe8) r47 = getgid() r48 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r48, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r48, 0x6609, 0x0) r49 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r49) r50 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r50, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r50, 0x6609, 0x0) r51 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r51, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r51, 0x6609, 0x0) r52 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r52, 0x40086602, 0x400007) write$cgroup_subtree(r52, 0x0, 0x0) r53 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r53) r54 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000003b00)='/selinux/context\x00', 0x2, 0x0) r55 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000003b40)='/selinux/policy\x00', 0x0, 0x0) r56 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r56, 0x40086602, 0x400007) write$cgroup_subtree(r56, 0x0, 0x0) r57 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r57, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r57, 0x6609, 0x0) r58 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r58) r59 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000003b80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r60 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r60, 0x40086602, 0x400007) write$cgroup_subtree(r60, 0x0, 0x0) r61 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r61) r62 = getpid() r63 = getpid() rt_tgsigqueueinfo(r62, r63, 0x16, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f00000052c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r65 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r65, 0x40086602, 0x400007) write$cgroup_subtree(r65, 0x0, 0x0) fstat(r65, &(0x7f0000005340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r67 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000053c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r68 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r68, 0x40086602, 0x400007) write$cgroup_subtree(r68, 0x0, 0x0) r69 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r69) r70 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r70) r71 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r71, 0x40086602, 0x400007) write$cgroup_subtree(r71, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r71, 0x0, 0x10, &(0x7f0000005400)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000005500)=0xe8) getresgid(&(0x7f0000005540), &(0x7f0000005580)=0x0, &(0x7f00000055c0)) r74 = getpid() r75 = getpid() rt_tgsigqueueinfo(r74, r75, 0x16, &(0x7f0000000100)) r76 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r77, 0x0) r78 = getegid() setresgid(0x0, 0x0, r78) r79 = getegid() setresgid(0x0, 0x0, r79) getgroups(0x9, &(0x7f0000005600)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0, r78, 0xffffffffffffffff, 0xee00, r79, 0x0]) r81 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000005640)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000005740)=0xe8) r83 = getegid() setresgid(0x0, 0x0, r83) r84 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000057c0)={&(0x7f0000005780)='./control\x00', 0x0, 0x28}, 0x10) r85 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r85, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r85, 0x6609, 0x0) r86 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r86, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r86, 0x6609, 0x0) r87 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r87, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r87, 0x6609, 0x0) r88 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r88) r89 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r89, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r89, 0x6609, 0x0) r90 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r90) r91 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r91, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r91, 0x6609, 0x0) sendmmsg$unix(r4, &(0x7f0000005ac0)=[{&(0x7f0000000180)=@file={0x0, './control\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x1000}], 0x1, &(0x7f00000015c0)=[@rights={{0x1c, 0x1, 0x1, [r5, r6, r7]}}, @rights={{0x28, 0x1, 0x1, [r8, r1, 0xffffffffffffffff, r3, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, r17}}}], 0x88, 0x4004}, {&(0x7f0000001680)=@file={0x2, './control\x00'}, 0x6e, &(0x7f0000001740)=[{&(0x7f0000001700)="dfee4cab6642eb77a32ceb1cafd7dc0596e97de3", 0x14}], 0x1, &(0x7f0000001900)=[@rights={{0x18, 0x1, 0x1, [r18, r19]}}, @rights={{0x20, 0x1, 0x1, [r20, r21, r22, r23]}}, @cred={{0x1c, 0x1, 0x2, {r25, 0xee00, r26}}}, @rights={{0x28, 0x1, 0x1, [r29, r30, r31, r32, r33, r1]}}], 0x80, 0x4000105}, {&(0x7f0000001980)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002a40)=[{&(0x7f0000001a00)="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", 0x1000}, {&(0x7f0000002a00)='(', 0x1}], 0x2, &(0x7f0000002a80)=[@cred={{0x1c, 0x1, 0x2, {r35, r37, r38}}}], 0x20, 0x880}, {&(0x7f0000002ac0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002c40)=[{&(0x7f0000002b40)="b3e3c85bcb190da46ee4d34ea4bcc9a9389deeaafa6a35d28bbf1233a07089a17bc659f7d1c2ea77ed1fb2972910a039de4a5b17c23b7683b50c59530f348c4d94be4c14ca5a3374833830fd0af94e5c03d6f44a391044b3092d8c23b0cc33a039171ff63234357b060e56257e36f2ff0c74e0ebcdec", 0x76}, {&(0x7f0000002bc0)="8e53931f2044c3130bd975a88a07f7ead0832e8542963c3b8a0551329c4918bb54044b8021f7bf2f9597669e43053fe291c2ecc23b527e9b32341465d879eceb297c959cfe2b11ce643b", 0x4a}], 0x2, &(0x7f0000002cc0)=[@cred={{0x1c, 0x1, 0x2, {r39, r41, r42}}}, @rights={{0x14, 0x1, 0x1, [r43]}}], 0x38, 0x40}, {&(0x7f0000002d00)=@abs={0x2b529a4225fd9dd0, 0x0, 0x4e24}, 0x6e, &(0x7f00000035c0)=[{&(0x7f0000002d80)="af39ad1e3a37c6d425c9231328a9bab9953a6a72a018e4bddbcedaf7ac2d5c482f93fb42c84628f92bb9d4f309160c8b1c3ee884f433cba18d280a8216f1af8d8ca675249daa9945a867e6429bd6f90be0eb9c12b57cfb1aa43df75aa0bce5ef1f1c18220e11b6dbd84a98041177648e66073c51bab9d7aaad17c8a7661fed4918cb5269c90c5c3089e48236210a62268461fce56d53b9cf1c889c747dee9f16129d0e93b9fc08e17c2f09a32fda677cdc", 0xb1}, {&(0x7f0000002e40)="769f073935e8cf89dcac73bb8d505c991ac304357d1d0c2941e974cfd5b89a344dd23596e30e3d5bd0627ab9f23f7110426cae991cfa23ffa648376729ff32bf6b0b0a2a8e26686421e17e503df3fa6a11d29c72f34cf13330a0d9e85f32aa64fc5fb27e81c4b5fe9e3145d233c99ea19cd020d98dba3e71d98f99220767106215387419454f7ea7d7ad19d26c10c3eeded019a21bbfe91c", 0x98}, {&(0x7f0000002f00)="271f836bb39051038c6fd7b09073bf18e16144a55ca5721bef929baf7ea379145ee00d9cc1ccec9a28dd0cb7155a5bd3addc1e5028609603710c76f47181c7dedaf1f655627c871ef6f7bc5aba20a37b03d99afe80a90f88a561f6b39eca6e5fa86c", 0x62}, {&(0x7f0000002f80)="3ef6ddb549bfee01424baa27ec29e1d3f46b4884fd724f4b77312b5223e794551867d9ffc35c26b072cba01e02e4499548b149c3432181a2c97c80e9d583b20b0d29c027204c5bf7e90b87e242840bd8ce6a87050db48e4106042103da7cbca35e3f844f07c3a52604073d43a73a97fbda454a476aedfe9bd1ef700cbffcb4d9dcac992ea6746702a724d42f5b495b1064f12da9babc5247e303c73d175d521fb1468c1372d4701df2f0351161cda2a6eb5625285593ebd93a2d79ae1bcbb746758a2ff6bd6c925babffc143f1db4f6407f5e5c6e1b2ffc12b67", 0xda}, {&(0x7f0000003080)="c5a3455b2c37919a17f80b6331546a80671bf20d15cdc75eddfef59119af5bee76adb4fca52a2ce25851535aaf5e7ec585ca91ebf5d2b6ffe1c40078a7da102f297a9b8dcb15f59bc61ab56b657a431e76515e61759863e4459248bad5f12480ffcab7e90281664cdf95ff9169929287e3176b07160a3d5629ef8bd151876326aa1d8177d5a4bceddd3e6aed7abfaf543616d6666374026d13ece70f79d612fc416fe5ce0fdb2d55a849cffd4ba9634c300cf6468b46b528ca740d4bdf8bfe2e8e09c71c6e1bbcd0222173296253053012c763f24db87f606407a1bdcbd994430b319e059dd5a7ed0b9289", 0xeb}, {&(0x7f0000003180)="ac78b96d53169663bcb0fcdd6ceb4522c9ab023e659d7c0f2a156059d76f45395200afb3821575ce525084335b8fc55874eeec1bab4311a13c9e0f6e71b5a9fa10a094d252261794bcc792d7f4cc6f0e3e8c6146967d861db0c2b6f61e5b4c54b62f8052da31903d226c90379b7d4a3f6c3a74d8cde57f6b8f1f3e00b2ec36d9cbbf7e7f73c671a7e25dff7e606ef112ff3a0abd5561e5cb54fc452b32d77b78748c077e11edc05aa12f3c29b59c19cde396e88b2e3e4062385e93c35eb2b098d8f746d7b89717d31f4ed74a134b7d357ee7fe3b1a1f06b3660184c15d18d2c2cd823a66d732a37329705e6328774b662d81edb525a2779dbf42058a0ca8fa", 0xff}, {&(0x7f0000003280)="db070ce34fe43f94eba663787b8cbfa82c934a00b0c4093117fe8590c0757d130612a256ca25cae767a73dda368251b052ce64c8a1884127c1a1254cc4d6ba42909206026939f7cf8ae8a89e2e5815dc57db47dc550e52285aed82f48eb2001adcc64e8c634cff62c2772286423c3f7cd2c5ae066922d739649b9bccd2b4c0d35566e6e3b346ca6c1d3491cb9b91c8416c327b18f09d8a3bae53d810cc70d784049ca94a349bca36c045a4d9b18ca79d07a30bdd03b6f66749f1951a165deb59e847eda3d6a3467ef1dc7e34a3d518", 0xcf}, {&(0x7f0000003380)="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", 0xfd}, {&(0x7f0000003480)="2c6d0f65c3857ea4c8b40d6e94965635c43261fbda1f7d4446cd8fdd4ac72053cb28fb7e404fbb24e60e2714c3f0f6b1a99e08778e9c3064656a6f1b91a3f0c6015ceb4fd89e978e9f4b1e5704519af658edeedecb1232f10521e4a0c5d72bd042e188ac687195033e1c26e941de72f4ffd2849af8545030521d065cbea0189d5938504064ef303b0a5900a628f6cd8012e68917a512a8c58c6eb45d84fd6394aba3a14943d74d8b56993d946a6416fb982eef6674c9", 0xb6}, {&(0x7f0000003540)="1eeb11458fbd941d7dab16e333fd920def37df8a333ef50413317cbf70c1822e1893dc8889385b9caea100d5bf099596adfa2026d8ff19277d7c674720f94f65e32e6de48eed9ee83ebef25e87213ab242941b56edc61999e0b4d9d2e1ba10706346d5b000c9d24eb4d0eb3789725655133e6762", 0x74}], 0xa}, {&(0x7f0000003680)=@file={0x1, './control\x00'}, 0x6e, &(0x7f0000003940)=[{&(0x7f0000003700)="8ead", 0x2}, {&(0x7f0000003740)="d78ec57e7cc85a7579ebdd69d80032cdca7a15c24320362fc54f5bb0716b0eddafea0e6ee332a002c4416f006d25923c5a8128b2de530e62e19b51a2d631e4a1a61da2d38a17c1c05664342670b15b1493dccbc189660c6966b7a39cd263c4ff83cc4d74ae4c8d4d39203e69f1098e1de8fc97ef7357e2a08632450c09b6e5537da4d999a35a9f74bc457e469e9e95bc12965c83334852a5fe63d69adc24587f2184b4aaccf363abd2342b38dcc0604fdb86e25dad0558237f1a62e4c40adec603bae0b825786b5c14e3c8c1befb314dcb474c9bd78937c745ef71101fcf9a", 0xdf}, {&(0x7f0000003840)="a44b360f7832c3c02265fc613508492b919e751e3aa02de97ef906e42247e1e036512c0056f7a2ac689fa9d277857ebcfea5d9ff5fbaa730184b783ec4b84b6e43c9cfb2b4cd86fa138e126d462d5bf430dcfec07c6822170d98fceb65e2f87e6836daf216ff589244f0aa4dbf81d10a", 0x70}, {&(0x7f00000038c0)="a5a965b01c669111bf8af9ab227c16dfe16a5e035c10918ab02ed73274d26f584f12647909631ff29d72ffb3ec3bb4165c98c0137b321790a4ae3aa4aef7f69f0018", 0x42}], 0x4, &(0x7f0000005c80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r45, @ANYRES32=r46, @ANYRES32=r47, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r49, @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r3, @ANYBLOB="000000002800001d000000000100000001000000c87c5746825aaecf7bea8e745f6df3af0370fc63486454d2c26946e1cc7ace98ce721b1ab3733ade", @ANYRES32=r52, @ANYRES32=r53, @ANYRES32=r0, @ANYRES32=r54, @ANYRES32=r55, @ANYRES32=r56, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r57, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r58, @ANYRES32=r59, @ANYRES32=r60, @ANYRES32=r61, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x800}, {&(0x7f0000003c80)=@file={0x0, './control\x00'}, 0x6e, &(0x7f0000005240)=[{&(0x7f0000003d00)="2def19001b1125065fbacf7f2589e5f26056163e5b10f1583f8eccda791cca0381951a92b71dc97e06235fc56aaeb62edb1ecc52f9bc05f00ff48ba92af698ce58ff455a7477795667f75c4900fb3e44192d79c50aa2f7f5b1faf76f5220f2be06a4abfc0ad13f09216ef66e1e8928faf12ed230caf4552ef0e61a6198421b3db8f98082631221188433f010ed6ab322c382993c63ab487e67ae122eb5e524f8de3cf215194c0707420e8acccc693eaba02647368125521fe59c7eff0e35b0", 0xbf}, {&(0x7f0000003dc0)="4028ce6c57064a50dc0f3398acaf8a362e317a6ead71eecac4e5c165e733bdaedfc6db011a0d934cc9", 0x29}, {&(0x7f0000003e00)="678203ec8fb0b20eeaf9de4f1d65947a648b089b54df8678fcc80901a64cb33fdafc1bdb1a5aba2edced55a6d63b8e9ed86a730909ab721f1c1678a02f186d10efd8c4d39c7a3c9dc1af14bd2cf0997f50d78fc38d5a95deb56bda601990551d548959f8d7ad19d2c4309d0bf47a8b123d3c9c0ad58c0e7bf220b65a1bca084ab482dcc3a5916bbf80d711ed4a489c6cb0d6b129266ff6ab1f9140fc46cc7840146ba90e88de19f5b5025f7375ffa0a1632ecf115d136756c243a7527a958713315c28ae182ab70eb00102f05cb69e0dd8d9a99df0cfc3ca5c5217f398bdfcab942bc3cbc45e506105c6", 0xea}, {&(0x7f0000003f00)="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", 0x1000}, {&(0x7f0000004f00)="d76ca58fe090427f8adbf4953b5b23a4ea895b7534720330c7309bb7dc1d84e5b1f553a047932fee0881f38eb72b7f2474b10e071a53d317fd82a2965457addf453ee7253fb4e7db0aeaa97a6980f45950a7e62e95da49589546abd081f33a0ae5095dd325c168548042f61cf143b2b6d89c4664ac6329bce2f4b56c3601bc00fd425438b1a430b2db0f2c73911b3795f53085004e3bfaf96b72f30ba019eec3b285e44a91265b537a8dbdfd7155dcd55b847e3b98036adebb92a5a15e2e88dfa72f6d41152fcda9ef13fffe3c8c21afce40230acfc67476e737ef14ae5f68e8c227da80b4270f3dc8c079c6e6cfc26cccde6224", 0xf4}, {&(0x7f0000005000)="83b344a6021432ebbad3c586cf6c91c0c68b0968dd34a4087f08f9144491e5f6373ff77ec24205a10ea577719346b83ad7f64332aeca995f7321070595ae9652abd6e267880d75af2cd52aefaa44dc0c5b3c35033cbd84b566b5078da401ed01", 0x60}, {&(0x7f0000005080)="f72b9698c6c4b0ddb3456f932e79a7817748bc8fe0dcb7496be7479f9ed550229453be4b3c368088f0837b6c87393fa9b322c9cac365ec994aadab5a1925651200ab82198fd19d6e5d38148dbcefdde4cc58102b5ff531dc59f4679197cef8dd07a3b5635bd61dda0c6029a1e8c39cafe1053415f5f905a27976cd753006c9306a7071de184f3b2532c8ecd78bf12a190285194dd997fc703df6caaacd4bedda9fb456510b1e1a16006cd6073fbc9662531b1955566af52b166b2f54049be2298761e093ddb7b17031a349986a6b5f342a", 0xd1}, {&(0x7f0000005180)="21f57b56513cc4617b473d41cc21256fa5e6597cdaee471c19555b8d700f6ce5d76fac3636173a0547cd0b94d16a9764798cd25b976e35446c8bb6b8663387ba3cb14d0b52e8b772c3f5a943395365407491d20ae9b37a778ea75744b04c7e3d70b0e78f8f0bd64e8484bbe23f087977aa09a3d4be8961933623100f8c6a2b7773e078839df2135de6523689b44d4b4b3544ff8fb07eb5cfe617", 0x9a}], 0x8, &(0x7f0000005d80)=ANY=[@ANYBLOB="1c000020000000000100000002000000", @ANYRES32=r62, @ANYRES32=r64, @ANYRES32=r66, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r67, @ANYRES32, @ANYRES32=r68, @ANYRES32=r69, @ANYBLOB="14008c1152a349ccca00200000003653a49a3b5df4a800", @ANYRES32=r70, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r72, @ANYRES32=r73, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r74, @ANYRES32=r77, @ANYRES32=r80, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r81, @ANYRES32=r82, @ANYRES32=r83, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r84, @ANYRES32=r85, @ANYRES32=r86, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r87, @ANYRES32=r88, @ANYRES32=r0, @ANYRES32=r89, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r90, @ANYRES32=r91], 0x110, 0x4}, {&(0x7f0000005940)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005a80)=[{&(0x7f00000059c0)}, {&(0x7f0000005a00)="9e73161d47bd21e2447f2dd2bb9990b8921f604f11bef8f672db493f8c2d2ed06a02361b8ca4104ebe5c074e4e39627077eaf320191467c51eddbcfdc4893e4724807836c2", 0x45}], 0x2, 0x0, 0x0, 0x820}], 0x8, 0x4000040) fstat(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./control\x00', 0x0, r92) r93 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r93, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r94) open(&(0x7f0000000140)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944dba) 03:43:19 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 834.756939] audit: type=1400 audit(2000000599.540:60061): avc: denied { map } for pid=25040 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:19 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) [ 834.901131] audit: type=1400 audit(2000000599.580:60062): avc: denied { map } for pid=25040 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:19 executing program 3: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = dup2(r2, r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000100)=r5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r6, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', r6}) r7 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket(0xb, 0x2, 0xc1) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 835.045998] audit: type=1400 audit(2000000599.590:60063): avc: denied { map } for pid=25040 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.220130] audit: type=1400 audit(2000000599.600:60064): avc: denied { map } for pid=25042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.302636] audit: type=1400 audit(2000000599.610:60065): avc: denied { map } for pid=25042 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 835.450581] audit: type=1400 audit(2000000599.620:60066): avc: denied { map } for pid=25040 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.634687] audit: type=1400 audit(2000000599.620:60067): avc: denied { map } for pid=25042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.834025] audit: type=1400 audit(2000000599.630:60068): avc: denied { map } for pid=25042 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 835.954715] audit: type=1400 audit(2000000599.640:60069): avc: denied { map } for pid=25040 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:21 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:21 executing program 3: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = dup2(r2, r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000100)=r5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r6, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', r6}) r7 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket(0xb, 0x2, 0xc1) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 836.669747] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:43:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:22 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000180)=""/37, &(0x7f00000001c0)=0x25) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x8, 0x3d, 0x1f, 0x3, 0x0, 0x8, 0x1008, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0xa}, 0x80, 0x2, 0x3, 0x6, 0xffffffffffff7fff, 0x0, 0xffe1}, r0, 0x9, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f0000000040)=""/89, &(0x7f0000000100)=0x59) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0xb4, 0x80, 0xd58, 0xffffffff}, 0x10) 03:43:22 executing program 1: pipe(0x0) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1800) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf6c0bf31d60578b8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x18, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}}, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x30410000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x38, r1, 0x682, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x10004004}, 0x40) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r3 = dup2(r2, r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000001140)=0x9) creat(&(0x7f00000000c0)='./bus\x00', 0xb1) getpgrp(0x0) gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004b40), 0x4000000000000ce, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r4, &(0x7f0000000140)=""/4096, 0x1000) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000001180)=0x4) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 03:43:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, r3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4623}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000280)={0x0, 0xffffffdf, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e71d595a", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) alarm(0xffffffff) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x800) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)}, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r5, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 03:43:23 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0402cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYBLOB="ccf54b7ee305f51a839e067ba279bdd904c8c0b3ccf81e28bdf2632ef1b7b15ace21e8538b2cabbf872680194ea0d120fca4d1629d49dcfe05b56464a478abce57b153ec3757f196acb54459", @ANYRESHEX], 0x0, 0x84}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f0000000100)) r3 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$cont(0x31, r3, 0xa, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r4 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(r4, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r5, &(0x7f00000017c0), 0x33c, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext, 0xd86113be646f5d43, 0x7, 0x0, 0x1, 0x9, 0x1, 0xe7}, 0x0, 0xc, 0xffffffffffffffff, 0x0) getuid() openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) unshare(0x20020000) r6 = creat(0x0, 0x0) lseek(r6, 0x800000, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) r8 = accept$packet(r7, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) fadvise64(r8, 0x0, 0x9, 0x4) write$binfmt_elf64(r6, &(0x7f0000000600)=ANY=[], 0x19b) 03:43:23 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x80480, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) setns(r0, 0x20000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:23 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @local}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x100, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='team0\x00', 0x3, 0x7c, 0x9}) getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = epoll_create1(0x80000) clock_gettime(0x3, &(0x7f0000000100)) fremovexattr(r5, &(0x7f0000000000)=@known='system.sockprotoname\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:24 executing program 0: capget(&(0x7f0000000240)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000280)) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x800, 0x8000) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@alg, &(0x7f0000000440)=0x80) r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r4, r5, 0x16, &(0x7f0000000100)) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r11, 0x0) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0x40086602, 0x400007) write$cgroup_subtree(r13, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r13, 0x0, 0xb, &(0x7f00000005c0)='/dev/loop#\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) r16 = getegid() setresgid(0x0, 0x0, r16) r17 = getpid() r18 = getpid() rt_tgsigqueueinfo(r17, r18, 0x16, &(0x7f0000000100)) r19 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) r21 = getpid() r22 = getpid() rt_tgsigqueueinfo(r21, r22, 0x16, &(0x7f0000000100)) r23 = getegid() setresgid(0x0, 0x0, r23) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000800)={0x80000, 0x1a, 0x1, 0xffffffffffffffff}) r25 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r25, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r25, 0x6609, 0x0) r26 = openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0x0, 0x0) r27 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r27, 0x40086602, 0x400007) write$cgroup_subtree(r27, 0x0, 0x0) r28 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r28, 0x40086602, 0x400007) write$cgroup_subtree(r28, 0x0, 0x0) r29 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r29) r30 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r30, 0x40086602, 0x400007) write$cgroup_subtree(r30, 0x0, 0x0) r31 = epoll_create1(0xc0000) sendmsg$unix(r1, &(0x7f00000009c0)={&(0x7f0000000080)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="0712e5fa04cb2e8e8159343e85d7edf40f6f36878730f908423d36e204faf739ec259418760091750378288fde0dddbf8d7804869fa821de15339e4678a632afed2c7911b82a5c914682c0535f27913d6c17a9f238287df6d8020b5ccc1441f1574e249f9b77f38f1d70c100ca0d66288ef6324a218397bc6c36a2fd7afbfce80f928d4e36d862456578968b30a20e41a8b20ed6d36fbd46970da1351bcc82fef1d002b2e12c3719d38e396b059c6890b1867810d2462c8592d3b6d86c021c2521e8f9da2f388d143ec0fe4175d464353856fcbd5eb692b49c51f68e80878104374b1d3ed8d3fd", 0xe7}, {&(0x7f00000002c0)="089d09738548d0f41e7bdbdfc838d1ef94e4304d7c710b30c50dd8f1419d14b92e94819b5ea0bde3ce88820e71ffeacf0524d98fb9993ed6039b55ba0663f9f9d459315c4794616c1b57b441ab5bc73591689a73973f22f13b9d4d41ca99ebfd20b3e1ef47bffaed6d6068176ce8bd46256eaf620b613415cedcfabdbad193087dcc4091cf3e611fa26a09516c3a866a96d2d6d2ed62dcef78f15a7a3f1b7ca7af475b433ad4353c590f79fed9e98dc4e5e406ce95360b27f8693061f7f7a7a3013c4cacad", 0xc5}], 0x2, &(0x7f0000000880)=[@rights={{0x1c, 0x1, 0x1, [r2, r3, r0]}}, @cred={{0x1c, 0x1, 0x2, {r4, r7}}}, @cred={{0x1c, 0x1, 0x2, {r9, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, r19, r20}}}, @cred={{0x1c, 0x1, 0x2, {r21, 0xffffffffffffffff, r23}}}, @rights={{0x24, 0x1, 0x1, [r24, r25, r0, 0xffffffffffffffff, r26]}}, @rights={{0x2c, 0x1, 0x1, [r0, r27, r0, r28, r29, r30, r31]}}], 0x118, 0x40}, 0x40100) [ 839.633797] kauditd_printk_skb: 235 callbacks suppressed [ 839.633806] audit: type=1400 audit(2000000604.550:60293): avc: denied { map } for pid=25147 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:24 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:24 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 839.808256] audit: type=1400 audit(2000000604.590:60294): avc: denied { map } for pid=25147 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 839.910855] audit: type=1400 audit(2000000604.600:60295): avc: denied { write } for pid=25141 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 839.996677] audit: type=1400 audit(2000000604.630:60296): avc: denied { map } for pid=25147 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.100174] audit: type=1400 audit(2000000604.630:60297): avc: denied { read } for pid=25141 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 840.221815] audit: type=1400 audit(2000000604.640:60298): avc: denied { map } for pid=25147 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.316657] audit: type=1400 audit(2000000604.800:60299): avc: denied { map } for pid=25161 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.416466] audit: type=1400 audit(2000000604.800:60300): avc: denied { map } for pid=25161 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.476834] audit: type=1400 audit(2000000604.810:60301): avc: denied { map } for pid=25161 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 840.594902] audit: type=1400 audit(2000000604.820:60302): avc: denied { map } for pid=25161 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:26 executing program 0: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB="7f454c460000fd000700000000000000000000009100000092030000000000004000000000000000000000000000000001800000040038000000000000000300000000000500000000000000000000000100010000000000f30000000000000000000080000000000100"/1400], 0x578) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000100)={@broadcast, @remote, 0x0}, &(0x7f0000000240)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x1c}, 0x60, r3}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5e5bc53ab81262c0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3e1ef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc92051a5b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7927d6b2bcdceb6b7fb4fccbc00"/236], 0x8) getgid() sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountstats\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) ioctl$VT_RELDISP(r4, 0x5605) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f00000001c0)=""/69) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000140)=""/83) 03:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:26 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ptrace$cont(0x18, r0, 0x3b, 0x80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:26 executing program 4: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:26 executing program 3: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000600)={'NETMAP\x00'}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) getrandom(&(0x7f0000000180)=""/40, 0x9db3ff6336c4215d, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) close(0xffffffffffffffff) pipe(&(0x7f0000000180)={0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19, 0x1, 0xff, 0x5c, 0x180, r1, 0x401, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) setresuid(0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r3 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) fchown(r3, 0xee01, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) open(0x0, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x1f) 03:43:26 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92d44076d3b97247e066165ccf1032f51d36ab231f6c20d87e91eed2f2db4734535e0293b467edf69776dca67d90a17ccd18fb9cff0000", 0xa4}], 0x4, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f0000000100)) sched_setparam(r1, &(0x7f0000000000)=0x7fff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:26 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x3c, &(0x7f00000003c0)=@routing, 0x8) 03:43:27 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) 03:43:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ftruncate(r1, 0x800) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9c49) 03:43:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:43:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open$dir(0x0, 0x0, 0x24) r0 = getpid() creat(0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000170001010000000001000000040000000800110033000000516877045b377cdeddbf2cb181bb981e42aa7b25a9511d4f27d67abad2f5ac2e46ecb2762d6947764d218f40d40b1966c4b610965c27d4c299c911a80919b07c567011c07c6aec7891c207c02cb3c8ecff55120f4d8bb39d3d8de74cdf5465da2cdb1cbeda173723397fa7e6f9d96e46dfe224e37d6ee4199cbd5fcf6215e765d0dc34b70ca01928f6e4c677b0d6bc23cef4f109c2e6ce58eefaecf9002b4d47e429c8b1c43e1b6f014037f51fd6b2272c2a6708531f10d4e0669d1928ece99118c3a713d67ba25ce00c6f8d25c33085d327dd76a7f9b6991f121b22b7"], 0x1c}}, 0x0) 03:43:28 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0), 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:29 executing program 4: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:29 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000300)="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") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000040)={{0x100000001}}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:43:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:43:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000040), 0x3c4) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x5f70b710}) 03:43:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000e00686866000c00020008000300000000335aadbcd6bd94205fab18edbb00"], 0x38}}, 0x0) [ 844.640938] kauditd_printk_skb: 189 callbacks suppressed [ 844.640947] audit: type=1400 audit(2000000609.560:60492): avc: denied { map } for pid=25260 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.840150] audit: type=1400 audit(2000000609.560:60493): avc: denied { map } for pid=25263 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:29 executing program 5: exit(0x4) creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x2a0, 0x0, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 844.977666] audit: type=1400 audit(2000000609.570:60494): avc: denied { map } for pid=25263 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 845.077485] audit: type=1400 audit(2000000609.580:60495): avc: denied { map } for pid=25263 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 845.207673] audit: type=1400 audit(2000000609.590:60496): avc: denied { map } for pid=25263 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:30 executing program 2: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 audit_backlog_limit=64 [ 845.845457] audit: audit_lost=790 audit_rate_limit=0 audit_backlog_limit=64 03:43:31 executing program 4: unshare(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:31 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3d3427e) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) 03:43:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006500000000b3a300c3a00000000000109500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x6d, &(0x7f0000000080)=0x4, 0x4) 03:43:31 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001882110300000000000000000a00000000000000000000000c00090008000000", @ANYRES32=0x0], 0xffffffffffffff16}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:43:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000001c0)="d5620ccb0cd042f4866c04f7eb5ae747686899aaa2f69246117684d6130cffffffffe5f619e401d03a4d81a01be052616ad6581e9696766fa41581446b0c3cc5e83a6433065283e55b60", 0x0}, 0xfffffffffffffc89) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd02969341", 0x6}], 0x1000000000000006, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), r4, &(0x7f0000000140), 0xfffffffffffffff7, 0x4) 03:43:31 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0xeca249061e41a042, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = getpid() ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0x1) r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) sched_getscheduler(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) ioctl$TIOCCBRK(r5, 0x5428) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', r7}) setresgid(0x0, 0x0, 0x0) 03:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000065000000000000000000000000000000950000a200000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 847.229285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33304 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.288907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.346643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.446498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 03:43:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = getegid() setresgid(0x0, 0x0, r4) write$P9_RGETATTR(r1, &(0x7f0000000100)={0xa0, 0x19, 0x1, {0x35d1dd2dbc8c13f0, {0x10, 0x1, 0x3}, 0x11, r3, r4, 0x5, 0x9, 0x7fff, 0x3, 0x1, 0xdd6, 0x5f3, 0xffffffffffffff00, 0x3, 0x40, 0x56, 0x3, 0x2, 0x7f, 0x1}}, 0xa0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0xf7, 0xc6, 0x80, 0x3, 0x3f, 0x5, "5f5b91f59fbd7e2bfd6e216b3dd60992c186c46978c22605265296043bfcd84d20f8a26982e5ae2d693a45d555ab467ba8b1f2ddd19f8ffa842bb6a8d83754a0c5875cefd71eedec602a8d6b36b7cc11993995d7e165256d4c3fb167659382b46940fd64ffa95ed6fb93d18b5f815b87012ebd10c74178c5b15ba400c5ccfdd9552cd194097f1163d85ccaa60b96280a038223301c4b160586ce7f2858850c1031435c45c136ed0007696fb44d99f66583dd2b68a211be3441eaf6099aef24288d8862e03f517ea033c824ed50f1a94b5d5bee0f71516df249284f037c6ec280edd02309ff744692f73fd4c46cae5d6533dcf8dacdba6e"}, 0x20f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 847.533856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.623209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.699922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.802647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.880839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 [ 847.980560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25327 comm=syz-executor.0 03:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x5, &(0x7f0000000080)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x400}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:33 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:33 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:43:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) flistxattr(r1, 0x0, 0xfffffffffffffff8) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in=@initdev, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000380)=0x85) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000f00)=ANY=[]) r5 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x005t\xea\xdca$\r\x01\xf4\x10\xfd\xf0\xcc*\xf3r!\x04\xe5\xc1@\xf8\xee\xe2\xab\xe2\xc7s\x04\xc1y\xe7\f\x9a\x7f\xd9\xb2\xfb\x03\xf0\xe6\xc3O\x1ai\xa6\xc0\xfd\x9f\x8b\x13\f\x13M\xaf\xf1\xd0\x81Z?F\xfbM-^a\'\xed\xfe\xcc\x9b_\x83\x99f\x93C\x8f\'g\xaeq\x92GFu[\xf5\xd5\xf0\x924(\xe1\xdc\x81\x86C\x7f\xb1\xc4\xfb\xb3e\xa4\x94\xfcYI\x03\xaf\x19\x9bp9-PG\xe5\xf8{v\xe0\xbb\xe4\xef[\x9b\xc3\v\xc6;4\x18\xbb\x83\xdc\x13q\t`\xf1X!\xf5\xb9\xdc\xf6 \xc4\x04\xbe\x14\x16DI\xa1<\x97\xecb\'>f\x8c\xd0\xb0e', 0x1, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100026}, 0xc, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="dc0300001200010028bd2d1657d14c623e250000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3dc}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) ioctl$sock_inet_SIOCADDRT(r10, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) sendfile(r4, r5, &(0x7f00000001c0), 0x20002000005) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000c80)={'veth1_to_hsr\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="200000003b000000b0dc9874e37835be8de1f0d18ebf89e17bce1fdbf814f7d5f68717509f2e6a45896a8b8b671fb364d5139b10052df24d700cee10abea5e507dfea8"]}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)) ioctl$LOOP_CLR_FD(r5, 0x4c01) connect$inet(r0, &(0x7f00000000c0), 0x10) [ 848.293509] EXT4-fs (loop3): invalid inodes per group: 16384 [ 848.293509] [ 848.488659] EXT4-fs (loop3): invalid inodes per group: 16384 [ 848.488659] [ 849.768350] kauditd_printk_skb: 270 callbacks suppressed [ 849.768359] audit: type=1400 audit(2000000614.680:60760): avc: denied { map } for pid=25383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 849.842378] audit: type=1400 audit(2000000614.720:60761): avc: denied { map } for pid=25383 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 849.927989] audit: type=1400 audit(2000000614.720:60762): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:34 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="3f00000000000000650000c3a0020000000000950000000000000061134434418a8d8b18"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 850.010494] audit: type=1400 audit(2000000614.730:60763): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0xae, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 03:43:34 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x10000, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x20, &(0x7f0000000200)=0x400, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) 03:43:34 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000000)=""/67) set_robust_list(&(0x7f0000000180)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x5}, 0x18) setresgid(0x0, 0x0, 0x0) [ 850.042628] audit: type=1400 audit(2000000614.740:60764): avc: denied { map } for pid=25383 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 850.165329] audit: type=1400 audit(2000000614.750:60765): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 03:43:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f0000000100)) r3 = getpgid(r1) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) chown(0x0, 0xee01, 0xee00) getegid() ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 850.343347] audit: type=1400 audit(2000000614.750:60766): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 850.494515] audit: type=1400 audit(2000000614.800:60767): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:35 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$inet(0x2, 0x3, 0x80) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 850.647157] audit: type=1400 audit(2000000614.800:60768): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x10000000000000c5) [ 850.773867] audit: type=1400 audit(2000000614.830:60769): avc: denied { map } for pid=25383 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000080)=0xffffff00) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000001000000006500000080000000c3a00000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0x21) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x4}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 03:43:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0xf) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000000c0)=""/71) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x100000000) 03:43:36 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:36 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresgid(0x0, 0x0, r2) 03:43:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000080)=0xffffffffffffff80) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f0000000280)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:37 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f0000000000)=@add_del={0x2, &(0x7f0000000300)='tunl0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100005070000000000000008000000b9", @ANYRES32=r4, @ANYBLOB="00000000000000001800767469000c00020008000100ea8e7b76b12219da0600000000000000a0a9cf8c7a9c0a5ac28c6a668ba849731caa599b7e1f0af6305c6d79b04de2e4326aab6074b3d7267ef0bc628bfe12c0437cc4b6aedd3797b643fbf500"/111, @ANYRES32=r4], 0x38}}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) execveat(r8, &(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)=[&(0x7f00000003c0)='tunl0\x00'], &(0x7f0000000680)=[&(0x7f0000000500)='tunl0\x00', &(0x7f0000000540)='md5sum\x00', &(0x7f0000000580)='lokeyring\'\x00', &(0x7f00000005c0)='{user\'cgroup$\x00', &(0x7f0000000600)='(%!trustedcgroup/)))\x00', &(0x7f0000000640)='tunl0\x00'], 0x400) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000001400010000004f5c3d19a1db02e9e100160000000002f50000", @ANYRES32=r4, @ANYBLOB="0800020000000000"], 0x20}}, 0x0) r9 = getpid() r10 = getpid() rt_tgsigqueueinfo(r9, r10, 0x16, &(0x7f0000000100)) sched_rr_get_interval(r10, &(0x7f0000000140)) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 03:43:37 executing program 5: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getpid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x8}, {r1, 0x8000}, {r2, 0x8100}], 0x3, 0xf5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4005b00000000006500000000000000c3a00000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.GMACK64MMAP\x00', &(0x7f0000000280)='^em0*,\x00', 0x7, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c6530205e656d302a2c000af58577c773f3ca00f1aabd3902fd9efbd30d39e9207751e4f44667fe825831eba717aefd349ae9501a7abf9fa4d2bbf50e742b24393dab7855dde1cbf8d7cc0851f999a7c63f5816026bbd3b9c6a98edcac304a8727eaabd5211c4a0ce9028decd0044a4ede0139366f99b3045bbef0441bf6bb65417f4b31d641c7475d30c25f43c7f05b71d8e0c1adc7e964b6b21ab3c8a078d5ec97e764eff8e985eed76aacd3c002cc5b144a5d079a378dcf714761b9cc8b20fdec853f05bb2bd9b3d39b214870081fb81a13161f2371ee6fd3615c81781c2db37e8ae29bf00000000000000"], 0x2e) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}}) [ 853.266588] selinux_nlmsg_perm: 22 callbacks suppressed [ 853.266600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 03:43:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x16, 'memory'}, {0x10, 'pids'}, {0x56, 'io'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x15, 'cpu'}, {0x2d, 'io'}]}, 0x25) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 853.395505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 [ 853.495288] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 [ 853.556641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 [ 853.650395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 03:43:38 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x15, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xaa, &(0x7f0000000180)=""/170, 0x0, 0x4, [], r2, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x9b, 0x9, 0x10000, 0x8}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000000)='./bus\x00', r3}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 853.750636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 03:43:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1, 0x57, 0x0, 0x400}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x5801}, 0x0, 0x0, 0xffffffffffffffff, 0xd) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000100)={0x0, @adiantum}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x1, 0x9, 0x3f, 0x0, 0x1e}) r4 = dup3(r1, r2, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chdir(0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6080, 0x0) [ 853.834169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 [ 853.870793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pig=25470 comm=syz-executor.3 [ 853.885844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25471 comm=syz-executor.3 03:43:38 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 853.933398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25470 comm=syz-executor.3 03:43:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x214c00, 0x0) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="f80000003e0010002cbd7000fbdbdf25080000001fcd752078da8fe340576b87e124e9c049bb0e50de367e7fe72899e9cb0e71ce590714e21bd1bf97fab17dd4a01b1ff0e6145f65cef25642086c88f272580fa127a95d63b71075e74a1188af979c5cd463c2b9b5f6e137c2d894067e2ded0f17e0ea4a794a7e6a92e77b747d52bf9374c98cc29ea712a65172ba4ab7bdb40ab5be31bc6aaca05896edaa573b897d9a72057274170aea2ecded450334f183e048938c0299dee62dc07a53cd72eed2166d795a05da51ca38ca7a5bc4ead28b74cb1400780008000800", @ANYRES32, @ANYBLOB="08006500e000000204004700000000"], 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x4810) 03:43:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) ioperm(0x527c71ec, 0x8e5, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:43:39 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r4, 0x1, 0x6, @dev={[], 0xa}}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:39 executing program 0: syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000000c081000414900000004fcff000000", 0x58}], 0x1) socket$netlink(0x10, 0x3, 0x8000000004) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 854.775052] kauditd_printk_skb: 180 callbacks suppressed [ 854.775061] audit: type=1400 audit(2000000619.690:60950): avc: denied { create } for pid=25491 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 854.836710] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:43:39 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e24, @broadcast}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000feffffff4f04000018010000500200000001000068030000680300006803000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="7f0000010000056b000000ff00000000aaaaaaaaaabb000000000000000000000000000000000000f80080ff7f0000000000000000000000ffffffffffff0000000000000000000000000000000000008000ffff7e00000000000000000000000000000510000081000101ff6970366772653000000000000000000065716c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000f000180100000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00038010000000000000000000000000000000000000000000000000000480049444c4554494d4552000000000000000000000000000000000000000000ff07000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000002a6000500030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4a0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xcd, 0x81, 0x2, 0xa, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0x1, @perf_config_ext={0x6, 0x2}, 0xf100, 0xfffffffffffffe03, 0xfffffffa, 0x7, 0x0, 0x4, 0x45db}, 0x0, 0x2, r2, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000080)={0x2000}) [ 855.023048] audit: type=1400 audit(2000000619.700:60951): avc: denied { map } for pid=25505 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 855.042707] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:43:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x0, &(0x7f00000000c0)={{0x77359400}, {r2, r3/1000+30000}}, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) [ 855.185002] audit: type=1400 audit(2000000619.710:60952): avc: denied { map } for pid=25505 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 855.338260] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x6f6d656d) [ 855.414964] audit: type=1400 audit(2000000619.780:60953): avc: denied { write } for pid=25491 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:40 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 855.557362] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 855.590646] audit: type=1400 audit(2000000619.790:60954): avc: denied { map } for pid=25505 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 855.743562] audit: type=1400 audit(2000000619.790:60955): avc: denied { create } for pid=25491 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 855.883262] audit: type=1400 audit(2000000619.800:60956): avc: denied { prog_load } for pid=25502 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:43:40 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58eb16f88b9663da5668b145e6313f3ee41e2f28204cede607a25340b61976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfaab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7de6e38d2d29be9a5adffffff7f00000000428958b132e079"], 0x10}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:43:40 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="b7d2fdd1c266fc290cfba31a053a4cab", 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="029aa2a9fde0a8fe81bf2a59749d143b", 0x10) 03:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080)={0xfffffffe}, 0x15b}, 0x48) [ 856.048206] audit: type=1400 audit(2000000619.810:60957): avc: denied { map } for pid=25505 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 856.286234] audit: type=1400 audit(2000000619.820:60958): avc: denied { write } for pid=25491 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 856.408400] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:41 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) getresuid(&(0x7f0000004180), 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x254000, 0x2) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x48201, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_subtree(r9, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r10, 0x6609, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x40086602, 0x400007) write$cgroup_subtree(r11, 0x0, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="0b094a363cc3a3ae5fedae2d58977da2530c9756b83afd8ab5d78b40aa4665bf7a1e9b2c857ec562672824985ad7b3272baf162d48ea3b690d314dabdfcc0c86a7557f9b31f68b3ddde4d8a181c748f646d5e205b1b4cb6a6452a9e990c777c4e9dd73dc72b4f57cb4d92ff07148182c90138e6bd27ec1e049e3f9f535400bd800863bffb89dfd4dee43f22aa9a18a45f8fcbec4c762c7205a389c8582dd8b0c7dff9246d9bc288fe21db16f82e0c8cb28", @ANYBLOB="4d4a01122999a2adf28f5f2aad25ab3e91af9d8b04c6da9c631c23cd4cfebcc20d917fe85312a9dc5f8a6b138d270dc9dd6aef8577cdc383ba37af45651f7c96c4cbca6cb11582110d17aba8ad7a00f4732267b8656e2e66abfbc4843f19d4df795c430c041790c3cb65d953433669aed358ccbe46b8039758a6b62c180bfd5f2e9618aaec5054d5b6108ddad4c93bab73129c2d98c5ab7a07cbcd88b00548104ec80358c4ec5d6bf3d83df93e7972b349e2140a431e1ca41293a1b7a007bed9ae159d4c85f3969393f290b556d6cda0d0f0cd3ee7cecbffc068c895dfeaa71c393418d8d56415e292415e16", @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r4, @ANYBLOB="145fa02838f854e2aafa64da71c3e11bc21d6943a4e79f9a9efd7726ce17a485d965e0acdaf9da8e6f3535f0db5e4ddc2d6e2848295fecebdd859a4ed52507454aa47bc747507e29009d886ec4362c8554a5d2caa799f93881d3a66d3543a87162cc7c0de3eb9fec1a7204407f38e604cc24259e0eeb35e220020c88c5ed12aa151cfbfc381750d437cbe926bec3c82ef7398f73f87ec423eebdc1b924ed91"], @ANYRES16=r5, @ANYRESOCT=r6, @ANYRES32=r7, @ANYPTR=&(0x7f0000000240)=ANY=[], @ANYRESDEC=r11], 0x8) [ 857.359086] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 03:43:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/214) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x6000, 0x800, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x20000000000002c2, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000200), 0x10}, 0x70) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) r4 = socket(0x10, 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0xb) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2f, &(0x7f0000000700)={0x375f, {{0xa, 0x4e22, 0x80000000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10001}}, {{0xa, 0x4e20, 0x101, @mcast1, 0x5}}}, 0x108) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000600)={{{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in=@rand_addr=0x1, 0x4e22, 0x8, 0x4e20, 0x7, 0x2, 0x80, 0x20, 0x49, r3, r5}, {0xa0f, 0x40, 0x80000001, 0x4af, 0x100000001, 0x101, 0x0, 0x8}, {0x412, 0x10000, 0x7, 0x1ff}, 0x3f, 0x6e6bb7, 0x3, 0x0, 0x4, 0x502486fd7b064abe}, {{@in=@local, 0x4d2}, 0xa, @in6=@local, 0x3505, 0x4, 0x6, 0x0, 0xf7, 0x2, 0x101}}, 0xe8) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$unix(r7, &(0x7f0000000440)="7a422e799a4f17217d36d18ce002c61ddf03014f287a6d12a60b25c039ed6075bf521ed5d5970479ae9066d9434c0e02323c61081acb10817f53bfd36b789a422278f9dc98f8476a1bf9956bb098e1ce8375d382ab02da577b32b6640a686cf4e065043e209e12005ba13a0f92320bb8d1536f345650004050214cba91c695192096a23c48731a138ad6f843fc9844c271fb7025e12551ff5177050ece4a5e573b43a6ce0dbb1cbf06072beee494f2f7165bf22675526790d445f2427914d01803c2f34eb8eaca3d73204869433478485dc0", 0xd2, 0x1010, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) [ 857.447418] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 857.543039] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 857.604640] EXT4-fs: failed to create workqueue [ 857.635485] EXT4-fs (loop3): mount failed 03:43:42 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0xfffffe51) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getegid() getgid() getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000180)) r3 = getegid() r4 = getegid() r5 = getegid() setresgid(0x0, 0x0, r5) r6 = getegid() setresgid(0x0, 0x0, r6) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() setresgid(0x0, 0x0, r8) setresgid(r8, r6, r7) getgroups(0x1, &(0x7f0000000280)=[r4]) setresgid(0x0, 0x0, r3) r9 = getegid() setresgid(0x0, 0x0, r9) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) r11 = getegid() setresgid(0x0, 0x0, r11) r12 = getegid() r13 = getegid() setresgid(0x0, 0x0, r13) r14 = getegid() setresgid(0x0, 0x0, r14) setresgid(r12, r10, r13) setresgid(r10, r11, r9) 03:43:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = open(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x100000001, 0x9, 0x1, r1}) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x380000) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) setpgid(0x0, 0x0) syz_open_procfs(0x0, 0x0) getpid() setpgid(0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f00000000c0)=0x4, 0x4) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:43:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'veth1_to_bridge\x00', {0x2, 0x4e23, @broadcast}}) 03:43:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x48c182, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) vmsplice(r3, &(0x7f0000000100)=[{&(0x7f0000000200)="75f825e7b6b1f67b0cd60ca8a50da82909f4b79761f78979b3e215c803675b69b0b4a10cc8979e0200c51afcc06ab7e419a4ddac3255c19ad2c2e3f2e7e4217392863a4b0e27b56297880e46033da8aab2b0ec3e55779a4857d61a74d67461162a53f6080f3d0e4ad6f479572a511ab42076cad4a93066fb8537927e189b130c9d57aa90d08583847fa7a8457e95d8a4299eaea3c03a40f2dc207bd6a1452eb749a96522707be79fa442895b0d61649c67d940beafdbddaa3ecd12d29184cb64d546b558054b685d7a11a8d470cc77cc89377cdad2faaa28fd491ba42b26b8c411a559ce02ad5066", 0xe8}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000000300)="550f59a254dab2dba1ab6358b1cea90cb09123fa4e160810e5c048106d90223a89f95f00afae18c713ba3cce173f2b91df3bd2c3088ed06aba5f2f6da11fbce8ec7306c1582b5aedf08729cb9d1e145dd764b87de0376223e1f584f2e12db768fd3aae69fd669d3ce7ccd683e107932108b02873c8e8d5dc6b5a7796f3d0bfc4273eb172ca67", 0x86}], 0x3, 0x1) r4 = socket(0x11, 0x800000003, 0x8) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_hsr\x00', 0x10) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) write$binfmt_aout(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="01000009810100000d0100000000000000000094921e6eea5e6c012de335c6e3dc404862240695492da606148623500d69c3a6a580645bfb9f4d0b9ac90ca92d9f99d88e7bc70cdb7cb78d1a5cb5811ac65111960000000000000000005993a91700"/109], 0x6d) recvfrom$packet(r4, &(0x7f0000000040)=""/56, 0x38, 0x0, 0x0, 0x0) 03:43:43 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() setxattr$security_selinux(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:wtmp_t:s0\x00', 0x1c, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) r4 = open$dir(&(0x7f0000000180)='./bus\x00', 0x200, 0x1) linkat(r3, &(0x7f0000000100)='./bus\x00', r4, &(0x7f00000001c0)='./file0\x00', 0x8ba8112474c424c7) sendmsg$sock(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000001300)=[@mark={{0x14, 0x1, 0x24, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x10001}}, @mark={{0x14, 0x1, 0x24, 0x5d}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0xf1f}}, @txtime={{0x18, 0x1, 0x3d, 0xb86c}}], 0xc0}, 0xe02450a708cee451) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:43 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:43 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141242, 0x8b9a9f52d8d7ed71) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000003dc0)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 859.781170] kauditd_printk_skb: 291 callbacks suppressed [ 859.781178] audit: type=1400 audit(2000000624.700:61234): avc: denied { map } for pid=25626 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.147863] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.165879] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.169006] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.189675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.199488] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.222222] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.230108] audit: type=1400 audit(2000000624.700:61235): avc: denied { map } for pid=25633 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 860.244548] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.267242] audit: audit_backlog=65 > audit_backlog_limit=64 03:43:45 executing program 1: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) lstat(&(0x7f0000001600)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) fsetxattr$security_ima(r1, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "7e5684786c559e5b1c21e7e2da00f26fb92d3a0b"}, 0x15, 0x1) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0xe846}, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @local}, 0x2c, 0x0, 0x0, 0x0, 0x4a8b, &(0x7f0000000000)='veth1_to_team\x00', 0x8, 0x7ff, 0x110d}) 03:43:45 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6(0xa, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="3d0000006f02000400400400000008000000000000000002000000040000000000000083030000000300000000000e0000080100000002000000000000"], 0x3d) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x6, &(0x7f00000001c0)="3c7139fd8f2d840a9900edbe7e61582d8bebb17dd77d19e465ba48ef17bda51c20b7b052e2b685ffa3d552e0fc6e29c8abd7003970f28a7c3e2154b9b22e06f64aee763c94da713fa1be73f832707eebddc87a22a8fd97d847d17c", 0x5b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000000)='./file0\x00', 0x0) 03:43:45 executing program 0: r0 = socket$inet(0x10, 0x2000000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x69, 0x5a62, 0x80000001, 0x348a2d61, 0x7fffffff}, 0x14) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:43:45 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/149) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:46 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xee6a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffffffffffd89) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) setresgid(0x0, 0x0, 0x0) 03:43:46 executing program 0: syz_open_dev$sndtimer(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) write$9p(r0, &(0x7f0000000100)="73b740bd7a793e6efa2332ea3dbaa80d6b4a07df33e536bb", 0x18) bind$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket$inet6(0xa, 0x3, 0x2f) readv(0xffffffffffffffff, &(0x7f0000000140), 0x19d) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, 0xc7, 0x0, 0x2, 0x46a, 0x3, 0x0, 0x0, 0x0, 0xffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, 0x0}) pipe2(&(0x7f0000000240), 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') request_key(0x0, &(0x7f0000000280)={'syz'}, 0x0, 0xfffffffffffffffd) 03:43:46 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:47 executing program 3: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:47 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x1, &(0x7f0000000000)=0x2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000040)={'\x00', {0x2, 0x4e24, @rand_addr=0xff}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) write$cgroup_pid(r0, 0x0, 0x25c) setresgid(0x0, 0x0, 0x0) 03:43:48 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:48 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, 0x0) accept4$inet(r0, 0x0, 0x0, 0x800) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$KIOCSOUND(r5, 0x4b2f, 0x0) r6 = getgid() r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r8 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r8, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000680), 0xc, 0x0, 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="aa4bc4bcd9068a10dd6d608e093215aa033be06c926927efe1aece55faab38e2c685eb4d13c1ced3bc08a47913fc219a65b11b04a363abf938e47964104d5866cd4caa853e91459b76117ff959e422d3610329359fee83b837c5702bc07d14775f2057262c3c91bd87566700000000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000c9001c0000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB="00000000ae80060795cc58f9cc20417d802169d2e912f2009ae7140f9f183c3a0700000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYPTR64, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="e81dff8b53615b3002f13aead9fce8e24a6ce96a464cf76d96fa866274d3c9e74bb9fe4e8732c46a994a98e63f8511b691dbcb10436452b466b19b3a8df04000b03ed57b17db4aae1c5086ad89b2a9e4893d5a29ea3ff76d34d183e414293bba236bd262cb5850ed32a4d302df2b4c79059cc281732ba6e43ce7c6794cb993", @ANYPTR=&(0x7f00000009c0)=ANY=[@ANYRES16=r4, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESOCT=r7], @ANYBLOB="d4ddee2c07ded50f9d0bfe0ea54409d98c0ef08506ff31ab490ceb922ce912c7d044a5274ddc4d17adfc90a5394eb760c8ee72980066081501449c980dcb078aa89b0f86106ccbb752a0a5beb843999ed886340f0f5136a0a1491bebeae8e1e697a932765aa51498a23acdf376c284d5e03223f2a6a2ab56c9e4dd5433fddda986fc6602b359ec", @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYBLOB="6ecbacb7656d460eee92278cbd776a3e59b6bd7870f5cadad2429bdf2daa7e80be398c0b74d6ad83248526a0604da2577a6b51a428f66475dbf78034b8dfbd20e9d5c94030ec92d819f156ded7891d721f9400b4639af5c5270eab5ccbe0ace174ea5987833f577c0a07861a2ece099497cc5e344dfeae6842a9", @ANYRES64=r8, @ANYRESHEX=0x0, @ANYPTR, @ANYRESOCT=r9, @ANYRESDEC]], @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x321, 0x48000}, 0x0) getegid() getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, 0x0, &(0x7f0000000000)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r10, 0x8903, &(0x7f0000000200)) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r11, 0x6609, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r11, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x2004}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0xb, 0x13, 0x9}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x7fffffff}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)='-\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000180)='/selinux/mls\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f00000005c0)='bdev\'-\x00'}, 0x30) openat$cgroup_subtree(r0, &(0x7f0000000940)='cgroup.subtree_control\x00', 0x2, 0x0) r13 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r13, 0x29, 0x21, 0x0, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, 0x0, 0x0) r14 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r14, 0x29, 0x21, 0x0, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) r15 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r15, 0x29, 0x21, 0x0, &(0x7f0000000000)) r16 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r16, 0x29, 0x21, 0x0, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r17 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r17, 0x29, 0x21, 0x0, &(0x7f0000000000)) r18 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r18, 0x29, 0x21, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xb14) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getgid() write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0xfffc) 03:43:48 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9067f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a450100010000000000bfcd05"], 0x9b}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) creat(&(0x7f0000000140)='./file0\x00', 0x40) ftruncate(r0, 0x7) 03:43:49 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0xf9, 0x2, 0xfcaf, 0x9, 0xfc}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x791000, 0x0) write$binfmt_elf64(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xff, 0xa, 0x1, 0x401, 0x2, 0x3, 0xf4d3, 0x30c, 0x40, 0x3ae, 0x1, 0x3, 0x38, 0x1, 0x1000, 0x1800, 0x983}, [{0x5, 0x2, 0x900000, 0xaa1, 0x0, 0xffff, 0x3, 0x36}], "6ee011ee9395574cd1a8226790e8073d27b504563e2043078a179026c80b554c056c836b2e7611f89e9bcaffb6f88dd2c8557e60937dc1eff5c68217828dc392d1773ff370ecbd01caf08fb4cedefe5efd6c49713be6c783d0f31a1148fa6d84b028729bc3fae71604d19a17c689c2afc1ddd59fe0d03c1f79a015b3bcf55245", [[]]}, 0x1f8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 864.816217] kauditd_printk_skb: 681 callbacks suppressed [ 864.816226] audit: type=1400 audit(2000000629.730:61621): avc: denied { map } for pid=25772 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:49 executing program 3: socket$inet6(0xa, 0x2, 0x0) get_robust_list(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)={0x0, 0x3, [0xe5a, 0xdcb, 0x0, 0xf47]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='io.weight\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000181, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002580)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @empty}, 0x2, 0x0, 0x4, 0x4}}, 0x80, 0x0}}], 0x1, 0x0) r4 = fcntl$getown(r3, 0x9) creat(&(0x7f00000002c0)='./bus\x00', 0x104) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, r4, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000200)={0x200, {{0xa, 0x4e20, 0x1, @local, 0x81}}}, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x605, 0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) r8 = dup2(r6, r7) write$selinux_context(r8, &(0x7f0000000380)='system_u:object_r:groupadd_exec_t:s0\x00', 0x25) [ 865.045791] audit: type=1400 audit(2000000629.780:61622): avc: denied { map } for pid=25772 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:50 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) setresgid(0x0, 0x0, 0x0) [ 865.253310] audit: type=1400 audit(2000000629.830:61623): avc: denied { write } for pid=25754 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 865.451567] audit: type=1400 audit(2000000629.880:61624): avc: denied { map } for pid=25772 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.639336] audit: type=1400 audit(2000000629.920:61625): avc: denied { map } for pid=25772 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 865.841038] audit: type=1400 audit(2000000630.040:61626): avc: denied { map } for pid=25778 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:50 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8652b001c0000fe8000040000000000000000000000bb00000000000000000000ffffffffffff00"/66, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/ip6_flowlabel\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB], 0x3}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x9, &(0x7f00000000c0)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0x6, 0x0, 0x8, 0x40, 0xfffffffffffffffd}, @jmp={0x5, 0x1, 0x0, 0xa, 0x3, 0x20, 0xffffffffffffffff}, @map={0x18, 0x1, 0x1, 0x0, r3}, @alu={0x0, 0x1, 0x0, 0x2, 0xc, 0x0, 0x8}, @generic={0x20, 0x7, 0x6, 0x0, 0x7}, @alu={0x4, 0x1, 0xa, 0x2, 0x7, 0x0, 0x4}], &(0x7f0000000180)='GPL\x00', 0x3, 0xfc, &(0x7f0000000280)=""/252, 0x40f00, 0x0, [], r6, 0x15, r7, 0x8, &(0x7f00000001c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x3, 0x9, 0x7f}, 0x10}, 0x70) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) [ 865.988714] audit: type=1400 audit(2000000630.050:61627): avc: denied { map } for pid=25778 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:51 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 866.170127] audit: type=1400 audit(2000000630.080:61628): avc: denied { map } for pid=25778 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 866.339073] audit: type=1400 audit(2000000630.100:61629): avc: denied { map } for pid=25778 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:51 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 866.475909] audit: audit_backlog=66 > audit_backlog_limit=64 03:43:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x40080) clock_gettime(0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0), 0x3) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7fff, 0xf, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb41, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x54e5ab0516dc59ae, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xbfffffffffffffff, r1, 0x0) memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x4e24, @dev}, {0x2, 0x0, @dev}, {0x2, 0x4e21, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x3}) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) request_key(0x0, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'sx\xfa', 0x3}, &(0x7f0000000280)="fc122f5140cb5ad4ad0450a3cc213c023731de747543809c2ca1a4ac1c3c8f353058f06b7c682f1a2bae5645cf39d28b5c3b71107b1c5112618b40366726a48c2e3b97c0263a5e7faf239fab5bd9aafe30687f9817028a7943ca1482aab9c44ef21bd6a3ae45574599bc5700d9015ed1ee62e68b68b3", 0x76, r3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000300)={r4, 0x7b, 0xfffffffffffffe2f}, 0x0, &(0x7f0000000340)="038c4ad1a130b064dbd7bb208fc14f10c97aa76067eb1794044a0af2defb5ad8ecb3a630f1d8f991b32225924d3989288c4d77b8af2e81590511c3789b218c280d57d1b1c1be9edc4e94430ed136d29678bee25db256da383ecec3b28d093f332a08cc8db7c1b32dcb2ff4d8551367d199248456bee244c2e180fd", &(0x7f00000003c0)=""/4096) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xffffffffffffffd7) rmdir(0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000001440)={'hsr0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000001400)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000015c0)={&(0x7f00000013c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x24, r6, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x1c9}]}, 0x24}, 0x1, 0x0, 0x0, 0x41048}, 0x80) unshare(0x60000000) r7 = syz_open_procfs(0x0, 0x0) preadv(r7, 0x0, 0x0, 0x0) write$selinux_user(r7, &(0x7f0000001500)=ANY=[@ANYBLOB="73697374655df497955f753a6f626a6563745f03005f736572000000000000000000000000000009005fbab04dc28a2b7cb223ab9d6dee122adbce813b2839d20625085aa44d63e4c42bd63434c04892f01a23e904b3d0bfa66fdac2b72570080a9028d3c1417d47afc9a32abf6e71d651f5bf43c477f5abd235ca6ea8394cb0c00fba77ef816c40efbb74991a6c20528dbe26b1f1494e0cd9b2a7e975ad9f4f6e2d7c753ee6fc20252952"], 0xab) 03:43:52 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) writev(0xffffffffffffffff, &(0x7f0000000180), 0x0) r2 = syz_open_procfs(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="d8000000", @ANYRES16, @ANYBLOB="080800000000000000000d000000440007006fc837bdf7687d146e71ca26d566562b08000200ed0000000c00030000080000000000000c00040000000000000000000c000300000000000000000008000100ff0000000c0004000800000000000000040006003000aba70400020008000100000000000400020008000100f7000000080001000900000004000200080001800be03b44040005003c000500080001006962000008000100696200001400020008000300ca000000085d010000000000040002000800010065746800080001002f8bd590"], 0x3}}, 0x0) close(r0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000080)=0x44) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) unshare(0x20600) getsockopt$inet_mreqn(r4, 0x0, 0x20, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000006023d87f8a13b0e68bc5127254d123f7a74b8a35c4c1ff460d039610c21d8056406e3396d8b72bdc5bfe9b5a8c6c0ef798f3065f82aefc7532b696f09377086e6e37830333fe107337106f8a0a4edda13cd0a2fd6808981399638f415"]) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) creat(0x0, 0x0) io_setup(0x40002100000008, &(0x7f0000000100)) 03:43:52 executing program 5: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x7a05, 0x1700) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x7}, 0x28, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r9, 0x0) setresuid(r4, r7, r9) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:43:53 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x25) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000560007031dfffd946f610500070000006700000077000000421ba3a20400de7e280000001100ffffba16a0aa1c0900f4ff7f0000000000005724171e1ade107e23f7efbf54ccfe0f", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r5 = eventfd(0xfffffff7) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r7, 0x0) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, r7, r8) r9 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x80, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r9, 0x0, 0x48c, &(0x7f0000000280)={0x1, 'team_slave_1\x00'}, 0x18) 03:43:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0xdc6421e83c4fe0db, 0x7, 0x27e7}, 0x18) lseek(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) 03:43:53 executing program 1: r0 = memfd_create(&(0x7f0000000080)='#em3#/\x00', 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f00000002c0)=0x30) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7fffffd}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x80800, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f00000014c0)=0x9, 0x4) socketpair(0x10, 0xa, 0xf9, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r4, &(0x7f0000000100)="1f035cb5b5353eba427762efbe443dbbd54ff34723416f1e820752a356a2f789c786e3e146ce82fc212fea007653c02ffe6eea6bde497cf78d542bfe566d9f1ab71eec07d814b0eb779fe05e6c256c192a361615e1d9af2792148cf7a6459eac61f39411e7cdda625ea8899601ebe859662f18fe4df9e9ad3519d6a6ad4be41446da7e", 0x83, 0x10000, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) r5 = socket$unix(0x1, 0x5, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/mls\x00', 0x0, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x80000000006, 0x100010, r0, 0x1b) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000003c0)={'filter\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000480)=""/4096}, &(0x7f00000000c0)=0x78) mincore(&(0x7f0000005000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/15) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 03:43:53 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:53 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180), 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) fremovexattr(r1, &(0x7f0000000000)=@random={'btrfs.', '\x00'}) [ 868.935766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 869.166440] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:43:54 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4307c0, 0x0) 03:43:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {0x0, 0x7530}}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) socket(0x11, 0x800000003, 0x8) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x20d) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) shutdown(r0, 0x1) 03:43:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x200002, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000240)) pselect6(0x40, &(0x7f0000000000)={0xa0cd, 0x200, 0x619, 0x1, 0x42, 0x3, 0x6, 0xbf9}, &(0x7f0000000040)={0x5aa8ad02, 0x200, 0x5, 0x401, 0xee9b, 0x424, 0x4, 0x3}, &(0x7f00000000c0)={0x74a, 0x4, 0x1, 0x88, 0x3, 0x496, 0x5, 0x9}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={0x9}, 0x8}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) [ 869.842529] kauditd_printk_skb: 277 callbacks suppressed [ 869.842537] audit: type=1400 audit(2000000634.760:61893): avc: denied { map } for pid=25873 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:54 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 869.931896] audit: type=1400 audit(2000000634.760:61894): avc: denied { map } for pid=25872 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 870.080207] audit: type=1400 audit(2000000634.760:61895): avc: denied { map } for pid=25872 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 870.179389] audit: type=1400 audit(2000000634.800:61896): avc: denied { map } for pid=25873 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:55 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000140)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000000)=""/107, &(0x7f0000000080)=0x6b) setresgid(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) [ 870.295319] audit: type=1400 audit(2000000634.800:61897): avc: denied { map } for pid=25873 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:55 executing program 3: syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file1\x00', 0x0, 0xc}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffe03, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x56, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/create\x00', 0x2, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4205, r3, 0x202, &(0x7f00000000c0)={0x0, 0x1000000}) r4 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r4, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="10000000000020000000000001000400"], 0x10}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) r5 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) r6 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r6, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8ec43db8fdcd0f4a881951863c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a12728c86ba4091ebfe1d07d497540f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a"]}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001640)=0xe8) r7 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r7, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) socket$key(0xf, 0x3, 0x2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) sendmsg$TIPC_NL_LINK_SET(r8, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, 0x0}, 0x4000004) ioctl$TIOCGSID(r8, 0x5429, &(0x7f00000005c0)) r9 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20100, 0x4) ioctl$KDGKBENT(r9, 0x4b46, &(0x7f00000012c0)={0x0, 0x0, 0x8b}) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f00000014c0)={0x77359400}, 0x6e51a1ee6b214e0) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r10, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e22, 0x80000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="86837daa8876c92369287b5db301ea9e788c18e918fbec01a20fc2215b43059f43c8ec43db8fdcd0f4a881951863c52a43f7740de9bd1bc8067cff105ad573d9dd0ae46c45699086948b0fcb4cfdc780eba82e8928a12728c86ba4091ebfe1d07d497540f9831322c17b868b72f6928a6552139de1d0691cebb47dff610a"]}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001640)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000001680)={{{@in=@local, @in, 0x4e24, 0x80000000, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0xbe, 0x0, r11}, {0x9, 0x50b, 0x1, 0x7f, 0xfffffffffffffffd, 0x4, 0x3}, {0x4, 0x9, 0xffffffff, 0x3}, 0x9, 0x6e6bbf, 0x0, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1}, 0x4d4, 0xff}, 0x2, @in6=@local, 0x3502, 0x4, 0x3, 0x200, 0x9, 0xffff, 0x1ff}}, 0xe8) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) r12 = socket(0x40000000002, 0x3, 0x2) r13 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r13, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendmsg$unix(r13, &(0x7f0000000840)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000000740)=[@rights={{0x10}}], 0x10}, 0x0) dup2(r12, r13) [ 870.417556] audit: type=1400 audit(2000000634.830:61898): avc: denied { map } for pid=25872 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:43:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) pause() inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0x80000000) rmdir(&(0x7f0000000040)='./file0\x00') [ 870.562068] audit: type=1400 audit(2000000634.890:61899): avc: denied { map } for pid=25872 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 870.684729] audit: type=1400 audit(2000000635.410:61900): avc: denied { map_create } for pid=25886 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 870.826848] audit: type=1400 audit(2000000635.500:61901): avc: denied { create } for pid=25886 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:55 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) unshare(0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x40, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000300)={0x7, 'gre0\x00', 0x4}, 0x18) exit(0x0) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x3}) r3 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="b5"}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x38}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bond0\x00'}) r6 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000001c00070cab0925000900f00007ab08000800000003000000210001c000000000000000000c00000000039815fa2c1ec28656aaa79bb94b46fe0000000a0002", 0x43) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a61c) splice(r0, 0x0, r6, 0x0, 0x10005, 0x0) 03:43:55 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000180)={{0x0, 0x0, @identifier="9835ada8e908ecbf50f181741c72034a"}, 0xea, [], "a291af4201af436a6fb21d9533a61117af801a8844db018f633015a57e07fd7a2dd6fbcb449e5f304e229f192ec22974d12120e569dbb2243f7fbceaf246ac6451d79c6e88570aac9976ef0f503e38120549922edfdef8e73f48d0312bbbcf50d15869a4811c83d1193fcd97fc5dcf59b0555765d52b8d9bbeb311b366b02b71ab85f52572ad12598935f8c8f23055ca1c67efbcafcc1eb616199b7940db631dd4f3443c6d07e77c99c8bfe13998003bd5a94c4db548f8446984b45db4406013c5af53cdf48c06133ca204f8068e8b888f6ad99d607a5d4092e0e88eda41925dfe615e1ed78aafec4b77"}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000000)={0x43, 0x9, 0x2, {0x7, 0xe8b, 0x6, 0x4, 0xff, 0x100000000, 0x100000000, 0x3, 0x4}}, 0x43) setresgid(0x0, 0x0, 0x0) [ 870.992930] audit: type=1400 audit(2000000635.520:61902): avc: denied { write } for pid=25886 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:56 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200080, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000ac0)={0x41424344}, 0x81, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000001b80)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@generic={0x7, 0x8, "715c417b12ff"}]}}, @tcp={{0x4e22, 0x4e24, r3, r4, 0x0, 0x0, 0x10, 0x1, 0x0, 0x0, 0x0, {[@generic={0x0, 0x7, "be757047bd"}, @nop, @sack={0x5, 0x2}, @fastopen={0x22, 0xe, "b700000000000000609cb5a3"}, @md5sig={0x13, 0x12, "5a1cfb6f4c3d28c514da983c28a5d7f8"}]}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000ac0)={0x41424344}, 0x81, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000001b80)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast, {[@generic={0x7, 0x8, "715c417b12ff"}]}}, @tcp={{0x4e22, 0x4e24, r5, r6, 0x0, 0x0, 0x10, 0x1, 0x0, 0x0, 0x0, {[@generic={0x0, 0x7, "be757047bd"}, @nop, @sack={0x5, 0x2}, @fastopen={0x22, 0xe, "b700000000000000609cb5a3"}, @md5sig={0x13, 0x12, "5a1cfb6f4c3d28c514da983c28a5d7f8"}]}}}}}}}, 0x0) syz_emit_ethernet(0xbd, &(0x7f00000000c0)={@local, @random="00a5a677e326", [], {@ipv4={0x800, {{0x18, 0x4, 0x0, 0x15, 0xaf, 0x67, 0x2, 0xf3, 0x5e, 0x0, @local, @remote, {[@end, @rr={0x7, 0x27, 0x7f, [@broadcast, @remote, @multicast1, @empty, @broadcast, @broadcast, @loopback, @local, @broadcast]}, @generic={0x88, 0x2}, @ssrr={0x89, 0x13, 0x1, [@multicast2, @remote, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @ra={0x94, 0x6, 0x3}, @rr={0x7, 0x7, 0x2, [@local]}]}}, @tcp={{0x4e20, 0x4e20, r4, r5, 0x1, 0x0, 0x11, 0x80, 0x2, 0x0, 0x60c, {[@timestamp={0x8, 0xa, 0x991, 0xfffff000}, @mss={0x2, 0x4, 0x401}, @fastopen={0x22, 0x10, "cbd369718734fcf3b6efd64f8cf8"}, @exp_smc={0xfe, 0x6}, @mptcp=@syn={0x1e, 0xc, 0xf, 0x1, 0x3, 0x7f, 0x8}]}}, {"bb410b9885aea494a6cb9a"}}}}}}, &(0x7f0000000180)={0x1, 0x4, [0x138, 0x241, 0x9e1, 0x4d]}) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TCSETX(r2, 0x5433, &(0x7f00000001c0)={0x9, 0x401, [0x401, 0x5, 0x9, 0x9, 0x5], 0x1000}) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:43:56 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x47) 03:43:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000001965000000043f0000c3a0fcff00000000b500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:43:56 executing program 3: pselect6(0x40, &(0x7f0000000000)={0x9, 0x7, 0x3, 0x2, 0xffffffff80000000, 0x3f, 0x100000000, 0x81}, &(0x7f0000000040)={0x38000000000000, 0x3ff, 0x2, 0x4, 0x10000, 0x1, 0x0, 0x7f5}, &(0x7f0000000100)={0x401, 0x2, 0x3fff8000000, 0x1, 0x4, 0x8000000002, 0x800, 0x7}, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000280)={&(0x7f0000000240)={0x6}, 0x8}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000400)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r10, @ANYBLOB], 0x3}}, 0x0) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000c00)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000900)={0x290, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x274, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x4bb, 0x4, 0xfe}, {0x1000, 0x9, 0x10, 0x4183}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf6f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}]}, 0x290}, 0x1, 0x0, 0x0, 0x400}, 0x18401) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r11, 0x6609, 0x0) ioctl$sock_SIOCBRDELBR(r11, 0x89a1, &(0x7f0000000300)='tunl0\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="240000002d0009a6000000000000000000", @ANYRES32, @ANYBLOB="5859e6e8f1aad622"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r14 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r14, 0x0) syz_open_procfs(r13, &(0x7f0000000040)='fd/4\x00') 03:43:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007efff00dc000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 03:43:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x40) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000003ff6)='G\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000000), 0x3bb, 0x10, &(0x7f0000000000)={0x0, 0x400, 0x2}, 0x10}, 0x70) 03:43:57 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x5, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:57 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() mkdir(&(0x7f0000000240)='./bus\x00', 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x0, 0x55, 0x1000, &(0x7f0000000000)="fea2a87f14615a9b8aad901093c76f054e20c3fa64a0ed0145015287686f6def33eaa4719fecbe31ca5011ba9a48c5ddb46f96bb11b51b315c1e26a25527b9906e59cd2ca7f96d4ec2e48b6cf8ae81c3d057137c4a", &(0x7f0000000300)=""/4096, 0x4, 0x0, 0xaf, 0x3a, &(0x7f0000000180)="9326ba05e162a6fc2b3040e4a2d29e6bdb2567792629e6e86993521d63bf5d0e86afbf1f5abad1d087eb32aef3f20eb5cfcfa009e92755805c78f849dd7e5e11b4c973ba274bd2252a46e4cb13f788da11fe72e89f79ffd5cd229d0ab1b6355f9c857d501fb8bb444b9e41e91d8eefb492a1fc235f005203b79aa88b24ae10e26d3ff19cd39bb8ffda38cb6cc3197844caf646508f431e7599b1aad0b995f1b48d215c17b7913185c4dfdcc02c8f2e", &(0x7f0000000080)="839d17866f12d91e0455f1092391e710b7861b623c957f0f8d0c5609206fca607216cad1c610ec94a8703349afa8ff70facd22281c381459e2b2"}, 0x40) [ 872.728612] selinux_nlmsg_perm: 22 callbacks suppressed [ 872.728623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48847 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 872.859830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 03:43:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x12000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000040)={0x55, 0x4, 0x8d78, {0x4, 0x9}, {0x2, 0x8}, @const={0x545, {0x7, 0x8, 0x1, 0x3}}}) sendfile(r0, r1, 0x0, 0x8000fffffffe) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x6, 0x1, 0x7, 0x20, 0x0, 0x0, 0xb8012, 0xd887d5d1ddf6330a, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x75, 0x7fffffff, 0x2, 0x3, 0x7, 0x116d}, r1, 0x7, 0xffffffffffffffff, 0x1) [ 872.964112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 873.073317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 873.165325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 03:43:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup3(r4, r3, 0x0) write$binfmt_misc(r8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r9, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x12f}]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r10 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r10, 0x5429, &(0x7f0000000200)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653a8990785363940aed12f0000000000000022f1f169a4000000000000009f1f8175442ce71022fe64377a222d3fbf9d225bae78aba9d7ae45b0051a1221af27656f0372a9567bb821942ce72590f1bf41d20d4c", 0x55}], 0x4, 0x0) 03:43:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0xa05b3cd6a72d700c) [ 873.232628] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 873.316289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 873.398798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48847 sclass=netlink_route_socket pig=25962 comm=syz-executor.3 [ 873.409204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25961 comm=syz-executor.3 [ 873.514510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25962 comm=syz-executor.3 03:43:58 executing program 5: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x150) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) rt_sigsuspend(&(0x7f0000000000)={0x360}, 0x8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() rt_sigprocmask(0x3, &(0x7f0000000200)={0x5}, &(0x7f0000000240), 0x8) sendmsg$inet6(r0, &(0x7f0000001600)={&(0x7f0000000280)={0xa, 0x4e24, 0x7, @loopback, 0x2}, 0x1c, &(0x7f0000001400)=[{&(0x7f00000002c0)="6709d1e3e7c7842eebab56ac1c06b69aaf04f388b381422f59a40d245516a9a3ef2a81dc4e2cd26ddb3b4ba4de7600", 0x2f}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="c627bc2522dca3ec30e85df56f14d4183ad382745efa2b5991f6de53ea7c549bbbfee7335ada57d6afd370d2125fc3f71a6e630953938170656e3ceabb08628514edc9672be93dd96421326ccc71a32f28b1124cc6124bedff4333d745b5dc74a77213d658814c5642744e136596c370c025fdee8cd4dff9813ea8751d687510ac86ee565f9dbc57ce67c953c48b913367b1076ca0a6317b07d8907e610839bf4aa169f7889cd215f17e145847d81234f23086eb7eab77a4e7e4c5d592417575aae1d2e3c15fbc6a8722d442aeb16888db285218bc34a6e8aebfb53db5bab1e852d602", 0xe3}], 0x3, &(0x7f0000001440)=[@hoplimit={{0x14, 0x29, 0x34, 0x40}}, @hoplimit={{0x14, 0x29, 0x34, 0x81}}, @dstopts_2292={{0x70, 0x29, 0x4, {0xc, 0xa, [], [@generic={0x10, 0x4f, "58090abbea5a10293e0dcc9823243d3e267986f9f302924a464c587e08d6c1057c1a8ec4a400fe447d5234b650e6392a369f33de50e139311c56287a80e4abe2f3267335cc32042c88dcf21a4a59d3"}]}}}, @rthdr={{0xb8, 0x29, 0x39, {0x2c, 0x14, 0x0, 0x6, 0x0, [@mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @rand_addr="ae206073dc8bba1c2225b91152c5c3bd", @empty, @rand_addr="ddb72734370bf1ec5ece0eb4fb6ee3ac", @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @broadcast}, @dev={0xfe, 0x80, [], 0x27}, @mcast2]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xdc}}, @flowinfo={{0x14}}, @dontfrag={{0x14}}, @dontfrag={{0x14}}], 0x1b8}, 0x4000010) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = open(&(0x7f0000000080)='./bus\x00', 0x40, 0x4) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000100)={0x6, 0x2, 0x200, 0x5, 0x4, 0x8}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000180)=@generic={0x4, 0x9, 0x5}) prctl$PR_CAPBSET_READ(0x17, 0x7) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(r2, 0x0, 0xfffffffffffffd9c) setresgid(0x0, 0x0, 0x0) 03:43:58 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000000c0000000900000001000000020000000000000000300000000000000e00000016000000", 0x31, 0x1400}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x0) r1 = request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000640)={0x0, 0x1, {0x25, 0x23, 0xc, 0x6, 0x3, 0x1, 0x0, 0x6c}}) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)="c04ce82ecf3dae8bdc7a2fe2bc8011c7ab4e9f386721173586ad56147ba3affae6267d34a80f7f4a47b6036e756bda11777df557c8d3965f3b0363af43cf74f3aa3b8d97b67aa5e4b46add286cf4264ab0137bf4c2b09832a8de484b1c34a7706610e57fa85415cac6304890aa66fe3758b2873107b566a27c25ee1268958eea8f4e67bdbab799721e365033de18faaf9cd42d71c097b650e034eafe52b8594a68a826dea3377b3a0da0de2b8451b616823ec14f8ae5c210f3a214ea145b910740a2fc4d8c191c46f758897a4d4354ee509077d32b55fec7b10409bdf4bc2c0ac11c21d5529cb58205f4d340fea9", 0xee, r0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000700)) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', r4) keyctl$search(0xa, r3, &(0x7f0000000280)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, r4) r5 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="4e0812f2bbe8b8c3187590e84cc5176fa724ee46b5547a6f790f810d574c6fd0521d0a7efa350db35d69f765bfa2d5d569bed346c3025823311dff2251cee39fabf13605f415a466625428c45659c9749ce08207a2414f3ecb9a881559f78bdc16f2425cf54f3ab0639742f9cacf8a8e2e83263da2c9b3d76eaf57800265e8bf303349fc363508890c49270bd110114fc1f4263bec956bdbe527cad12cc96342a3e9eaf5", 0xa4, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000440)={0x0, r1, r5}, &(0x7f00000004c0)=""/248, 0xf8, &(0x7f0000000600)={&(0x7f00000005c0)={'sm3-ce\x00'}}) getitimer(0x2, &(0x7f0000000680)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) ioctl$SIOCGIFHWADDR(r6, 0x8927, &(0x7f00000006c0)) 03:43:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x0) 03:43:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r3 = dup3(r0, r1, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6000) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf4ffffff, 0x107100, 0x5, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x1000f4) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1810000, &(0x7f00000002c0)="adf34a20995b924b1f7362436a87ecb6e17c06699eb46cc932d0451c985f95d31ed68e6ec9d6e451777431b244c32b2f6a93180b384f190b24fb0c794296341ca297b828b21be5856710e3ead7eb94d63dda1671e1420ce0e87e693d23a4c6e4b6a5fa4ab72340f1e658593dce806693c72abfa6d6d916da9dcbc0bf1704a019d052ff1503555b9436476f8bb8dd7be2071680fe", &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)="2adc81682c4096cca7a2c368e032be33a4dbd4a8d727feec6c419122d993262a954539b6e1f1213298befcb360f08bef12080d2675e3031ddc80d876d758b8f75b7e53f5aa142611ec624bab71af92292233a13247b32b903c55ea") [ 874.855576] kauditd_printk_skb: 248 callbacks suppressed [ 874.855585] audit: type=1400 audit(2000000639.770:62151): avc: denied { map } for pid=26003 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 874.982936] audit: type=1400 audit(2000000639.810:62152): avc: denied { map } for pid=26003 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 874.997464] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:43:59 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x0, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa, 0xe0}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0x1fc, &(0x7f0000000140)=""/199, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7de}, 0x10}, 0xfffffffffffffecb) prctl$PR_SET_DUMPABLE(0x4, 0x2) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000080)=0x3, 0x4) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x200a00}]) io_destroy(r3) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) [ 875.086002] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 875.125336] F2FS-fs (loop3): Invalid blocksize (1), supports only 4KB [ 875.160107] audit: type=1400 audit(2000000639.840:62153): avc: denied { map } for pid=26003 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 875.162615] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 875.320145] audit: type=1400 audit(2000000639.860:62154): avc: denied { map } for pid=26003 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:00 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) [ 875.422863] [ 875.424534] ====================================================== [ 875.430852] WARNING: possible circular locking dependency detected [ 875.437161] 4.14.150+ #0 Not tainted [ 875.440861] ------------------------------------------------------ [ 875.447174] kworker/0:4/23254 is trying to acquire lock: [ 875.452610] (&sb->s_type->i_mutex_key#9){++++}, at: [<0000000055124a7b>] __generic_file_fsync+0x9e/0x190 [ 875.462332] [ 875.462332] but task is already holding lock: [ 875.468327] ((&dio->complete_work)){+.+.}, at: [<00000000936c4373>] process_one_work+0x735/0x1580 [ 875.477441] [ 875.477441] which lock already depends on the new lock. [ 875.477441] [ 875.485751] [ 875.485751] the existing dependency chain (in reverse order) is: [ 875.493368] [ 875.493368] -> #2 ((&dio->complete_work)){+.+.}: [ 875.499645] process_one_work+0x789/0x1580 [ 875.504408] worker_thread+0xdd/0xdf0 [ 875.508730] kthread+0x31f/0x430 [ 875.512614] ret_from_fork+0x3a/0x50 [ 875.516837] [ 875.516837] -> #1 ("dio/%s"sb->s_id){+.+.}: [ 875.522645] flush_workqueue+0x118/0x13b0 [ 875.527314] drain_workqueue+0x177/0x3e0 [ 875.531891] destroy_workqueue+0x22/0x5e0 [ 875.536572] __alloc_workqueue_key+0xb48/0xd80 [ 875.541705] sb_init_dio_done_wq+0x34/0x90 [ 875.546456] __blockdev_direct_IO+0x31cc/0xe24e [ 875.551642] ext4_direct_IO+0xa4f/0x2820 [ 875.556221] generic_file_direct_write+0x1e4/0x430 [ 875.561668] __generic_file_write_iter+0x209/0x550 [ 875.567118] ext4_file_write_iter+0x58f/0xdb0 [ 875.572135] aio_write+0x2ea/0x530 [ 875.576199] do_io_submit+0x8e7/0x13e0 [ 875.580606] do_syscall_64+0x19b/0x520 [ 875.585010] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 875.590967] [ 875.590967] -> #0 (&sb->s_type->i_mutex_key#9){++++}: [ 875.597649] lock_acquire+0x12b/0x360 [ 875.601970] down_write+0x34/0x90 [ 875.605936] __generic_file_fsync+0x9e/0x190 [ 875.610863] ext4_sync_file+0x3ac/0x1250 [ 875.615443] vfs_fsync_range+0x106/0x260 [ 875.620055] dio_complete+0x37e/0x860 [ 875.624372] process_one_work+0x7f1/0x1580 [ 875.629125] worker_thread+0xdd/0xdf0 [ 875.633448] kthread+0x31f/0x430 [ 875.637349] ret_from_fork+0x3a/0x50 [ 875.641571] [ 875.641571] other info that might help us debug this: [ 875.641571] [ 875.649700] Chain exists of: [ 875.649700] &sb->s_type->i_mutex_key#9 --> "dio/%s"sb->s_id --> (&dio->complete_work) [ 875.649700] [ 875.662191] Possible unsafe locking scenario: [ 875.662191] [ 875.668248] CPU0 CPU1 [ 875.672912] ---- ---- [ 875.677574] lock((&dio->complete_work)); [ 875.681803] lock("dio/%s"sb->s_id); [ 875.688120] lock((&dio->complete_work)); [ 875.694870] lock(&sb->s_type->i_mutex_key#9); [ 875.699532] [ 875.699532] *** DEADLOCK *** [ 875.699532] [ 875.705587] 2 locks held by kworker/0:4/23254: [ 875.710158] #0: ("dio/%s"sb->s_id){+.+.}, at: [<0000000034ad21c0>] process_one_work+0x6ff/0x1580 [ 875.719270] #1: ((&dio->complete_work)){+.+.}, at: [<00000000936c4373>] process_one_work+0x735/0x1580 [ 875.728835] [ 875.728835] stack backtrace: [ 875.733332] CPU: 0 PID: 23254 Comm: kworker/0:4 Not tainted 4.14.150+ #0 [ 875.740180] Workqueue: dio/sda1 dio_aio_complete_work [ 875.745366] Call Trace: [ 875.747958] dump_stack+0xca/0x134 [ 875.751505] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 875.756880] __lock_acquire+0x2f5f/0x4320 [ 875.761036] ? trace_hardirqs_on+0x10/0x10 [ 875.765272] ? check_preemption_disabled+0x35/0x1f0 [ 875.770295] ? _raw_spin_unlock_irqrestore+0x54/0x70 [ 875.775403] ? trace_hardirqs_on_caller+0x37b/0x540 [ 875.780419] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 875.785523] lock_acquire+0x12b/0x360 [ 875.789317] ? __generic_file_fsync+0x9e/0x190 [ 875.793900] down_write+0x34/0x90 [ 875.797350] ? __generic_file_fsync+0x9e/0x190 [ 875.801928] __generic_file_fsync+0x9e/0x190 [ 875.806334] ext4_sync_file+0x3ac/0x1250 [ 875.810392] ? wake_bit_function+0x160/0x160 [ 875.814796] ? ext4_getfsmap+0x8a0/0x8a0 [ 875.818853] vfs_fsync_range+0x106/0x260 [ 875.822915] dio_complete+0x37e/0x860 [ 875.826709] ? ext4_update_bh_state+0x100/0x100 [ 875.831376] process_one_work+0x7f1/0x1580 [ 875.835626] ? pwq_dec_nr_in_flight+0x2c0/0x2c0 [ 875.840298] worker_thread+0xdd/0xdf0 [ 875.844102] ? process_one_work+0x1580/0x1580 [ 875.848596] kthread+0x31f/0x430 [ 875.851956] ? kthread_create_on_node+0xf0/0xf0 [ 875.856805] ret_from_fork+0x3a/0x50 03:44:00 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) r3 = getpid() r4 = getpid() rt_tgsigqueueinfo(r3, r4, 0x16, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0xa0, 0x23, 0x3, 0x4, 0x0, 0x8, 0x13000, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x81, 0xa6ca2aff70ac74ef, @perf_config_ext={0x3ff, 0xfffffffffffffff7}, 0x70dab8db014da44, 0x5, 0x0, 0x5, 0x3, 0x1, 0x40}, r5, 0x3, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x8, 0xb9, 0x1, 0x1f, 0x0, 0x8, 0x8000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffff7fff, 0x1, @perf_bp={&(0x7f0000000180), 0x5}, 0x1000, 0x2, 0x5c1, 0x5, 0x400, 0x0, 0x1000}, r3, 0xf, r6, 0x2) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c010000c95d11b9827433f1a5271c296bb1be2d349f8e88ba716560674ef6dead29a27a5e94c312c32b399701aa5734bdef867c6710278001a6db59a3587b5225822e6494a1c2123c90318aac5134c6028c105a96b5d16f4af1656349d2b950328c230c002adad18edee10dd0a96de03326c00223", @ANYRES16=r7, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 875.867862] audit: type=1400 audit(2000000639.890:62155): avc: denied { prog_load } for pid=26004 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 875.940419] audit: type=1400 audit(2000000639.950:62156): avc: denied { prog_load } for pid=26004 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 876.037356] audit: type=1400 audit(2000000640.060:62157): avc: denied { map } for pid=26009 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:44:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x800000}, 0x15b}, 0xfffffffffffffede) sched_setparam(r1, &(0x7f0000000080)=0x400) 03:44:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup3(r4, r3, 0x0) write$binfmt_misc(r8, &(0x7f00000014c0)=ANY=[@ANYBLOB], 0x1) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r9, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x12f}]) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r10 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r10, 0x5429, &(0x7f0000000200)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653a8990785363940aed12f0000000000000022f1f169a4000000000000009f1f8175442ce71022fe64377a222d3fbf9d225bae78aba9d7ae45b0051a1221af27656f0372a9567bb821942ce72590f1bf41d20d4c", 0x55}], 0x4, 0x0) 03:44:01 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x0, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 876.147603] audit: type=1400 audit(2000000640.070:62158): avc: denied { map } for pid=26009 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 876.245823] audit: audit_backlog=65 > audit_backlog_limit=64 [ 876.252494] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x3}}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xf}, 0x70) 03:44:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) sendto$inet6(r4, &(0x7f0000000340)="151c14d246d92883d6fe634ac85010217d88525d5a6b9c1b473b8f4678df9b7f36e34c1574a924460d47f8c0a9d627883f155680ca755234b59d90da9f3fa88b47f985836b042d220987ae2775f8bda22e736e9618444432c6fb551c924ea68654bbc84dfe3d9b434ef19a5ecb6e38d7c49359fe5878de6095737b3e25a0f53dad86f72a79bcee712e6f3c11ebedf6e5409d7994ffd42af1890d51b7e757517bc158e12075c3707b0d7d287167fe13bdebc2376f4f1aaf721aba7a0eb6bcbb3703ea28000f93d27547e21b522d6dbf4c8cd18a5a1ce61897675c4ffc0c8a71421fb47433bcabf1654a2a88735f9d45eaa10d39ba3b6bb6", 0xf7, 0x4042801, &(0x7f0000000200)={0xa, 0x4e23, 0x10001, @remote, 0x2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000040), &(0x7f0000000180)=0x4) r5 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x11) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0xb2) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f0000000100)={0x5, 0x7, 0x80, 0x0, 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40086602, 0x400007) write$cgroup_subtree(r9, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6de6d2ccff5c11cc, 0x5, &(0x7f0000000080)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x80000001}, [@map={0x18, 0x7, 0x1, 0x0, r9}]}, &(0x7f0000003ff6)='\x80\xc7', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0x10}, 0x70) 03:44:02 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:02 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x0, 0x7, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:03 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x1, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe}, 0x10}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x0, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="7f70ef10568fd8fcd306af01e03eed32987f71fd9f161c4c3e3f00000000000000db5f7d441b4cc5ce9c6dae22bd7bce45426bf206ac9598cc00000000", @ANYRES32=r5, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c000000160000022dbd7000fbdbdf25635f9eff35c968a70b3ef384218176eca88a6458db37fafd2c4318abeff49b386aa6613c492b3c5279915106bdb89e2c5c49650e51b7a7effc031de42bd392025054d654903fe38be378ba0c009b018d345ad1f9c243c848f39900b2e0cfaca39fb0283dbc55fd4e18f4968fc9df096af9fb011f525a70fefeb47193fa252bcde1e65f598596fa2b1543e39f403ca7eb1067666fa4802fc68ff8504ea9c736bda1ade1f1c71c088d12d741", @ANYRES32=r5, @ANYBLOB="14000300696662300000000000000000000000000800080010000000080001007f000001"], 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 03:44:03 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000100)) r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r4, r5, 0x16, &(0x7f0000000100)) setpgid(r3, r4) setresgid(0x0, 0x0, 0x0) 03:44:03 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:03 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:03 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4002, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:03 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x0, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@filter={'filter\x00', 0xe, 0x4, 0x300, 0x1a8, 0xc0, 0x1a8, 0x1a8, 0x1a8, 0x268, 0x268, 0x268, 0x268, 0x268, 0x4, &(0x7f0000000040), {[{{@ip={@rand_addr=0x8001, @broadcast, 0x0, 0xffff00, 'rose0\x00', 'tunl0\x00', {0xff}, {0x7f}, 0x89, 0x2}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xf}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth1\x00', 'team_slave_0\x00', {}, {}, 0x42cac16d508edd95, 0x0, 0xb17443b406dfee94}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@inet=@ecn={0x28, 'ecn\x00', 0x0, {0xfbcb12a9a9b3a10, 0x20, 0x4, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)=0x3) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000006500000000000000c3a000458b1ecf507b27ab1a06bed71477fb5570d8c8acb88100a6e60000000000950000f9ff0000006284da69cb62af738bff4fe8fbc071700e28c115255cc92e6a34dd75588664807f692e052eb5e9baad1527b60c914d8647fcb96a05d7f531455943a1e867d7abe3909d"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:04 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:04 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000006522000000000000c3a00000000000009500000000000000cc61cbe678f3ac9264b82a1904d6e93daf213ebf1fa8dae095b628632135625f9ade264a0bbdf0f5ea83277607ca7870ed7a8c3dc94bd4bbc45d213cb3441fcebcfb5169b06c2ce0202b85e3ef77860bc0670168329d000000000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:04 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:04 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "86df35820806d3eb84"}, 0xa, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_ENDIAN(0x14, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:04 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x0, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 879.861625] kauditd_printk_skb: 484 callbacks suppressed [ 879.861634] audit: type=1400 audit(2000000644.780:62633): avc: denied { map } for pid=26167 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 879.996687] audit: type=1400 audit(2000000644.780:62634): avc: denied { map } for pid=26166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.121747] audit: type=1400 audit(2000000644.780:62635): avc: denied { map } for pid=26166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.264157] audit: type=1400 audit(2000000644.820:62636): avc: denied { read } for pid=26128 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:44:05 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:05 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) getsockname(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000100)=0x80) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4006004}, 0x0) r3 = fcntl$dupfd(r0, 0x605, 0xffffffffffffffff) ioctl$TCXONC(r3, 0x540a, 0x4c4b) 03:44:05 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x25, 0xc, 0x3, 0xf, 0x6, 0x3, 0x0, 0xf7}}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 880.471411] audit: type=1400 audit(2000000644.820:62637): avc: denied { map } for pid=26166 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 880.493097] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.514373] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.532320] audit: audit_lost=910 audit_rate_limit=0 audit_backlog_limit=64 [ 880.548828] audit: audit_lost=911 audit_rate_limit=0 audit_backlog_limit=64 [ 880.567434] audit: audit_backlog=65 > audit_backlog_limit=64 03:44:05 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') sendmsg$IPVS_CMD_DEL_SERVICE(r8, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x68cb14c26bb390c3}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="980000000afc45d10dfd8a9cf0a114d582a20200d742d18b9e30e066b17aa96ece4f818effb17ceb1a87afa87dedaccb09d2a34c540b89f45006d7a508087eefe3ceeb3ae0451432ae36bf2fd9b571e3ac9dbf288cfa78989515b79f9ff798a4f1e61a00a8f7d6af7dde94d1a0b6ab2775099d61e670a2e011fed222bddaefcfd3acb3f1e7d433f257b6a9c3e8e2460b311be3bb31cc31d2eb2473f83207be31bd5bbef4354936b14c34206ee83ce53f7abd8db968", @ANYRES16=r10, @ANYBLOB="000329bd7000ffdbdf250300000008000600f8000000340002000800050001f8ffff0800060200000000080003000400000008000800fcffffff08000b001e0000000800030013c3d7738748a1e44e0e0b00736970000c0007001a000000100000000800010002000000080002000004000008000b97e90000000800060073656400080004004e21000008000400060000003534e8ed023bb55a511870450f4cad41b9655471cdbcbdf35038e135"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 03:44:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b400000000000000000000c3a0000000000000b2f06ff33b409500000000000000c5bb668b1de5f7192615b54cfcd81bcebf597ca08b355e2038d52e0a2bcf8ca5fc4c74756cd5298dec4afa325ad7a6b7f100000000fec7f63a4dd20ea74a0ce21420d2f145c293b376ec5558d3343a52428e96bdff328d6e647bbc53745b3054142598f56a04b1c0239e8e206742d944939841cfd93593d411b5de237e8e23ab032bbbd8b05951b60adf68295a1223c1694a4cc090cf2cbef0263e4451ee93358e36"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:05 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:05 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x0, 0x9}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:06 executing program 2: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x202800, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400020000000000650000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) 03:44:06 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') 03:44:06 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) rt_tgsigqueueinfo(r0, r2, 0x37, &(0x7f0000000000)={0x8, 0x4, 0x6}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b400000076eb8d5bd43e2cd6000012af60507e2f00c3a8000000000000950000000000f6ff"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:07 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='\x00\x00\x00\x01\x80') 03:44:07 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="00270f9fc3d5ef6d50d91294280000", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:44:07 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:07 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:07 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) 03:44:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3ff, 0x65}, [@ldst={0x43484b3301a08b93, 0x3, 0x6, 0x0, 0x4, 0x1, 0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f00000000c0)=""/206, 0x0, 0x1, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffdbc, 0x10, &(0x7f0000000080)={0x0, 0x9, 0x4}, 0x5e}, 0x48) 03:44:07 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x540000, 0x1) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:08 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) ioctl$PPPIOCSACTIVE(r9, 0x40107446, &(0x7f00000006c0)={0x1, &(0x7f0000000500)=[{0x3, 0x3, 0x3f}]}) 03:44:08 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) setresgid(0x0, 0x0, 0x0) 03:44:08 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:44:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbff, 0x800000}, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioprio_get$uid(0x1, r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x65}, [@ldst={0x3, 0x0, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) 03:44:09 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r3, 0x0, 0x70bd25}, 0x1c}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0xffffff5d, r5, 0x0, 0x70bd25}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x0, 0x70bd26}, 0x1c}}, 0x40805) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x300, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:44:09 executing program 0: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) [ 884.873297] kauditd_printk_skb: 516 callbacks suppressed [ 884.873306] audit: type=1400 audit(2000000649.780:63150): avc: denied { read } for pid=26299 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:44:09 executing program 3: socket$packet(0x11, 0x2000100000000a, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000080}, 0x7acae7bb105ed20d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @multicast1}, &(0x7f0000000080)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu_user\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000280)=@generic={0x3, 0x4, 0x8}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r7, 0x8946, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000041c1, 0xb640e9c3eb7fa07, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700)}, 0x16100, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r5, 0x0, 0x30005, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x40383, 0x0) 03:44:09 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x5080, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_subtree(r0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) fcntl$getown(r1, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 03:44:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4720000000000006500000000000000c3a00000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15b}, 0x48) prctl$PR_SET_TIMERSLACK(0x1d, 0xff) 03:44:09 executing program 4: unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) get_robust_list(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x7}, 0x1d) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) setns(r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)="178600d6cb094c41d72827eb3c62e45730b2817e6e524f3242fd957269f12b83b3c1fd30bd2db50b5c82057a54dbf3f78749ca7a0b5ef5e6", 0x38, 0x7c}, {&(0x7f00000001c0)="03a06c44f18b841e72ea35ab", 0xc, 0x100000000}, {&(0x7f0000000240)="3db32d5825e84e8de32a38c2f46f4f0ff52d4f44f58b463790f76d5b26e68874c70689c21ce2c12f95d4b0fe67a26644bbb9ec9699720c7706bc57aec819f64a550a49625aa490cb6495d100db6eef4ba55fe6baa070aea006465e3e44a2fe0eb782ac1690ebf8da44109edf64a7a05112c8ce951833725285d16e333623ed7e0eb9f19e9f6eae7ecffc46cfe93e67f0cd2b8adb6cd54b97", 0x98, 0x66d}], 0x8000, &(0x7f0000000500)={[{@numtail='nonumtail=0'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 885.040997] audit: type=1400 audit(2000000649.960:63151): avc: denied { create } for pid=26337 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:44:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000080006500000000800000c3a800000000000095000000000000001bb7cd66700200feff013fff8a8aba54fc8e4ff3e5be86bdf8fc511d880c287435"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) [ 885.178678] audit: type=1400 audit(2000000649.980:63152): avc: denied { prog_load } for pid=26335 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:44:10 executing program 5: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x0, 0x38e, 0x1, 0x9}, 0x10) perf_event_open(&(0x7f0000940000)={0x2, 0x3e8, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6609, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 885.306367] audit: type=1400 audit(2000000649.990:63153): avc: denied { write } for pid=26337 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1